exploit the possibilities
Showing 1 - 25 of 78 RSS Feed

Files

Spraying OWA And Abusing MSSQL
Posted Sep 30, 2020
Authored by Haboob Team

Whitepaper that goes over a full attack scenario by getting a foothold through Microsoft Exchange OWA Portal to discover and abuse MSSQL.

tags | paper
MD5 | f741488af943c9146c71ec2735f7f3c3

Related Files

SSL Pinning Bypass
Posted Nov 13, 2020
Authored by Ismail Onder Kaya

Whitepaper that discusses bypassing SSL pinning. Written in Turkish.

tags | paper
MD5 | 847a6587dc05bf63b431eb89e707b61b
Google Chrome V8 Type Confusion
Posted Jul 27, 2020
Authored by Nayan Das

Whitepaper that discusses CVE-2020-6418 which encapsulates a type confusion vulnerability in V8 in Google Chrome versions prior to 80.0.3987.122.

tags | paper
MD5 | 5288e8aae7d73e86be39b7fc12c1b359
Cloud As An Attack Platform
Posted Jun 17, 2020
Authored by Akbar Siami Namin, Faranak Abri, Keith S. Jones, Prerit Datta, Moitrayee Chatterjee

This is a whitepaper that presents an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. The researchers presented the participants with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve their understanding of necessary security controls and recommendations regarding precautionary actions to circumvent the exploitation of clouds for malicious activities. They observed that in 93.78% of the responses, participants are abusing cloud services to establish their attack environment and launch attacks.

tags | paper
MD5 | 0f272b6b407ab987e5b3d5577fe511bc
Buffer Overflow Quick Guide
Posted Jun 8, 2020
Authored by Poseidon-ng

This is a brief whitepaper that discusses buffer overflows and analysis with the Immunity Debugger.

tags | paper, overflow
MD5 | 8f7fc3fa0d5d5b5b815394c941ee52df
Active Directory DCSync
Posted Apr 6, 2020
Authored by Haboob Team

This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.

tags | paper
MD5 | 360035b1cfe528f9ba2b3eab8d471d54
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
MD5 | cbf9769b6b0bca565ecb0c138d7549e2
HackBack - A DIY Guide To Rob Banks - Spanish Version
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks. Written in Spanish.

tags | paper
MD5 | 63058fff3240800bd66b55f04226be08
HackBack - A DIY Guide To Rob Banks
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks.

tags | paper
MD5 | 7fe8c92dfe5858a8ece2c480c3216d4b
Hacking The PS2 With Yabasic
Posted Oct 15, 2019
Authored by CTurt

Whitepaper that discusses hacking the Sony Playstation 2 with Yabasic.

tags | paper
MD5 | ef4d562726247dc6be934a633046b1bc
Johnny You Are Fired
Posted May 1, 2019
Authored by Juraj Somorovsky, Jorg Schwenk, Sebastian Schinzel, Damian Poddebniak, Hanno Bock, Jens Muller, Marcus Brinkmann

This archive contains proof of concepts and a whitepaper that describes multiple email client implementations where popular clients for email are vulnerable to signature spoofing attacks.

tags | exploit, paper, spoof, proof of concept
advisories | CVE-2017-17848, CVE-2018-12019, CVE-2018-12020, CVE-2018-12356, CVE-2018-12556, CVE-2018-15586, CVE-2018-15587, CVE-2018-15588, CVE-2018-18509, CVE-2019-8338
MD5 | d247e4ccd9f597d40309c5f5e797a348
Jumping Firewall With Tunneling Techniques
Posted Apr 30, 2019
Authored by Muhammet Ates

This is a whitepaper that discusses bypassing a firewall using tunneling techniques. Written in Turkish.

tags | paper
MD5 | 6b0c08d69652748f958c31ee7769b37e
WordPress Security
Posted Oct 5, 2018
Authored by Behrouz Mansoori

This is a whitepaper that provides an overview on WordPress Security. Written in Persian.

tags | paper
MD5 | 435d0d9d605b6700d89a567491f0e445
Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework
Posted Apr 24, 2018
Authored by Santiago Hernandez Ramos

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.

tags | paper, protocol, fuzzer
MD5 | 9eca60d90eccec483d8294bf95607a9b
MSSQL Error-Based SQL Injection
Posted Mar 26, 2018
Authored by Manish Tanwar

Whitepaper that discusses error-based SQL injection in "Order By" clause in MSSQL.

tags | paper, sql injection
MD5 | 65b9edfba25966175a4c63746a36bb30
Web Application Penetration Testing
Posted Mar 20, 2018
Authored by Manh Pham Tien

This is a whitepaper that goes over methodologies for web application penetration testing. It is very thorough with examples and overviews.

tags | paper, web
MD5 | dc7320a4b2fa3f14e7eb81e598507f31
Pivoting (Metasploit)
Posted Jan 23, 2018
Authored by Anurag Srivastava

This is a whitepaper that discusses pivoting attacks with Metasploit. Pivoting is a technique using a compromised system to attack other systems on the same network. Consider a scenario where there is some juicy information hosted inside a local network and there is only one system which is connected to internet. In this scenario, an attacker can compromise the system which is connected to internet and then use that particular compromised system in-order to test or attack other systems in the same network which are only accessible via local network.

tags | paper, local
MD5 | 57cdb74cffe8db64ca0c02b0d01f4a12
Code Injection - HTML Injection
Posted Sep 4, 2017
Authored by Shritam Bhowmick

Whitepaper that discussions both code and html injection attacks.

tags | paper
MD5 | 8a32755f82e4b581a5491e4fbe4cb3af
Web Services Penetration Testing
Posted Apr 17, 2017
Authored by Firat Celal Erdik, Mert Tasci

This is a whitepaper that discussing penetration testing against web services. Written in Turkish.

tags | paper, web
MD5 | 0d44214ba96b783c46bbca2a6e34d070
Injecting SQLite Database-Based Application
Posted Feb 19, 2017
Authored by Manish Tanwar

This is a whitepaper that discusses leveraging SQL injection attacks against SQLite databases.

tags | paper, sql injection
MD5 | 5d5a3664bfa800fd6c41493052b37555
Cloud Forensics
Posted Jan 14, 2017
Authored by Preet Shah

This is a whitepaper that covers basic cloud computer concepts, forensics, and challenges surrounding investigations.

tags | paper
MD5 | 0e4e3c4a10a0262519bcd94790ec0c7a
Counterfeiting With Cisco IP Communicator
Posted May 24, 2016
Authored by Suman Sah

Whitepaper that discusses how Cisco IP Communicator only uses MAC addresses for authentication allowing you to spoof other callers.

tags | exploit, spoof
systems | cisco
MD5 | 8bec58281b267dfc9884b43e3ff89a82
The Future Of Buffer Overflows
Posted Mar 21, 2016
Authored by Nicholas Lemonias

This is an academic whitepaper that discusses trends in memory exploitation.

tags | paper
MD5 | 8a2dcb51ee1a7e9fcbb3e3fe90bf524f
Assessing The CNO Capabilities Of Iran
Posted Aug 8, 2015
Authored by Dancho Danchev

Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran - A whitepaper that discusses various aspects of hacking in Iran and related groups that are active.

tags | paper
MD5 | 1ca269d8023a16ad66abd33da5d34af9
Analysis Of Fake Antivirus Malware Delivery
Posted Feb 24, 2015
Authored by HauntIT

This is a brief whitepaper that documents how the author analyzed malicious javascript and a host used for slinging fake antivirus software.

tags | paper, javascript, virus
MD5 | 3654b81a0923d7139addc5474f5d80b0
Metamorphic Worms: Can They Remain Hidden?
Posted Feb 2, 2015
Authored by Reethi Kotti

Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.

tags | paper, worm
MD5 | 4ae6e561c0c9dbfec13ce2965d4d8a49
Page 1 of 4
Back1234Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    9 Files
  • 26
    Nov 26th
    11 Files
  • 27
    Nov 27th
    15 Files
  • 28
    Nov 28th
    9 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close