exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Exploiting XXE Via File Uploads
Posted Mar 25, 2021
Authored by Neha Gupta

Whitepaper that discusses XXE exploitation via file uploads.

tags | paper, file upload
SHA-256 | 7c6849a41692d2abfdae193b26658ffc1ed539af111174b955d5ba020dc87949

Related Files

Top Web Application Security
Posted Dec 28, 2021
Authored by Shlok Gupta

Brief whitepaper that discusses well-known standards like OWASP Top 10, OWASP ASVS, WASC and CWE SANS 25.

tags | paper
SHA-256 | bb8c3ba79e4589a5aa83121ea754034f9c5a42dd7b26ad8c48c817a89a9ea285
Polkit CVE-2021-3560 Overview
Posted Dec 16, 2021
Authored by Julio Cesar Baltazar Sainz

Whitepaper that gives an overview of the Polkit vulnerability as discussed in CVE-2021-3560. Written in Spanish.

tags | paper
advisories | CVE-2021-3560
SHA-256 | a41b8393ce5c22e793b28b10b8d6c72d64b22b0b06202998991ab9e195b4ef1c
DNS Spoofing
Posted Dec 16, 2021
Authored by Rodriguez Padilla Luis, Cortes Leyva Carla

This is a whitepaper that discusses DNS spoofing. Written in Spanish.

tags | paper, spoof
SHA-256 | f2ea4bf58281fa68bc973561373c15277c62566c003a2f7a9096cddecd79929e
Remote Code Execution In WhatsApp
Posted Nov 24, 2021
Authored by cor le

Whitepaper that gives an analysis of the remote code execution vulnerability noted in CVE-2019-11932 for WhatsApp that affects versions prior to 2.19.244. Written in Spanish.

tags | paper, remote, code execution
advisories | CVE-2019-11932
SHA-256 | 7866772d314829babcae8d60f3a6173f7e55759aac6e5184ca91290e471e6320
Brute-Force Login And Bypass Account Lockout On elabFTW 1.8.5
Posted Oct 14, 2021
Authored by samguy

Whitepaper that gives an overview on brute-forcing login and bypassing account lockout on elabFTW version 1.8.5.

tags | paper, cracker
SHA-256 | 094a251f151a7eb62b59cfd2e713ac0c84510e643ec38087d3cafab6380e06e8
EDR Protection Is A Myth
Posted Oct 12, 2021
Authored by Deepanshu Khanna

Whitepaper that discusses the functionality of EDR (Endpoing Protection and Response), how it compares to antivirus, and how it can be manipulated.

tags | paper
SHA-256 | ece8d73b3f5b494064886d578b32c0f9fcd8723057d66ff7d4e4b551ab1d242d
Deserialization Of Untrusted Data In jsoniter
Posted Sep 30, 2021
Authored by Adi Malyanker

Whitepaper that discusses deserialization of untrusted data in jsoniter.

tags | paper
SHA-256 | 0ca417e1ce7adae9c50ca05cb6775b57ac7716c04884972cfd2a9cbbb6b0a4a4
Local Administrator Is Not Just With Razer.. It Is Possible For All
Posted Aug 25, 2021
Authored by Lawrence Amer

This is a whitepaper that discusses additional vectors of attack that can be used against Razer products.

tags | paper
SHA-256 | d896ee68726d14957e7b9ef3ead4ea6080977a3951b1f9246dab51ea5e04be7c
PIP Vulnerability In Android 11
Posted Aug 16, 2021
Authored by Akshay Sharma, Tanmay Tyagi, Abhinav

This is a whitepaper that gives an overview of the PIP vulnerability in Android 11.

tags | paper
SHA-256 | de30f374a906fe8d9c0d8bb8b7dfebcf0db353f3671a5b1d8f515460f9e6c36d
Network Pivoting HackerEnv
Posted Jun 18, 2021
Authored by Hejap Zairy Al-Sharif

Brief whitepaper that goes through proxy, ssh, and vpn pivoting during an attack. Written in Arabic.

tags | paper
SHA-256 | a1e855c508e17641d2eb114eced9cbb69be22f676f04484aaf30c490b078784e
XAMPP File Overwrite Vulnerability
Posted Jun 3, 2021
Authored by Ravindu Priyankara

This is a whitepaper that details exploitation of the XAMPP file overwrite vulnerability.

tags | paper
SHA-256 | 599c840a9119e2c8108281701779707886926208b2da13457cc0150074c5afdf
ExifTool Djvu Code Execution
Posted May 19, 2021
Authored by Ashutosh Upadhyay

Whitepaper that discusses improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up that allows for arbitrary code execution when parsing a malicious image.

tags | paper, arbitrary, code execution
advisories | CVE-2021-22204
SHA-256 | 0517fcbf4b8f3c300d297bd3f60618a661d06f0ec5760f4909a67a4c5ac00216
Wordlist Overview
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that discusses wordlists, where to get them, and when to use them.

tags | paper
SHA-256 | 89e78120ceaeb9a64b5808490e77eb00fad19d19fe3106904104df63dfb37a31
HTTP Host Header Attacks
Posted Apr 22, 2021
Authored by SunCSR

This is a brief whitepaper that discuss HTTP Host header attacks.

tags | paper, web
SHA-256 | a6fa96ce1a609cfb613a8375b0180918f63f56cc17ee3a3c76e0de0ea38c3e92
GraphQL Attack
Posted Mar 30, 2021
Authored by SunCSR

This is a whitepaper that discusses attacking GraphQL.

tags | paper
SHA-256 | aa2a135e3c79bce67c8da5438837eb4be4d82d6384d4352b498bfce711c37beb
File Transfer Cheatsheet
Posted Mar 8, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that goes over file transfer mechanisms that can be used on Windows and Linux.

tags | paper
systems | linux, windows
SHA-256 | bb53fbaa2dc352533456cf7d06a33392552c749b608b8e33b3b03227d97e1520
Microsoft SMBv3 CVE-2020-0796 Exploitation
Posted Mar 6, 2021
Authored by Team SafeSecurity

Microsoft SMBv3 CVE-2020-0796 whitepaper that discusses the workings, exploitation, and mitigations.

tags | paper
advisories | CVE-2020-0796
SHA-256 | 9154829412e6f27bbd51d39811e1acf07f15b9daf04fbad8e3cb61e74d7e6c62
Web Application Reconnaissance And Mapping
Posted Mar 5, 2021
Authored by Rishabh Vats

This is a brief whitepaper that goes over some tooling that can be of assistance while performing reconnaissance against a web application prior to attack.

tags | paper, web
SHA-256 | efa89877156455ecbe4998579276a2b7f88564aac2a446ce3a8fdb5d7a98c52c
Neo LMS / Matrix LMS Cross Site Scripting
Posted Feb 19, 2021
Authored by Mauro M.

This is a whitepaper that details identifying cross site scripting vulnerabilities in both the Neo and Matrix LMS codebase.

tags | exploit, paper, vulnerability, xss
SHA-256 | 425783c0a58f4b3d8ceaa1ef51c78b248dc59a4e994ea242a952886897d53b3d
Secure Coding References
Posted Dec 21, 2020
Authored by ManhNho

Whitepaper that discusses secure coding practices and touches on security principles.

tags | paper
SHA-256 | 9f6048e80ea6065b6c5a3a4d114d2785cec99719ba4095264843a7765ea4d3f1
Unmasking Hidden Sites
Posted Dec 21, 2020
Authored by labrat

This is a whitepaper that discusses unmasking hidden sites behind Cloudflare an Tor.

tags | paper
SHA-256 | 55b41d984f3de143bc1ab3d75c2bfb2181b35277644bc2e08ecee6160697f930
SSL Pinning Bypass
Posted Nov 13, 2020
Authored by Ismail Onder Kaya

Whitepaper that discusses bypassing SSL pinning. Written in Turkish.

tags | paper
SHA-256 | 8e4b24e390ce31c897804f6427429f08f9ebbc7266dada92a0e4ce6c62427667
Spraying OWA And Abusing MSSQL
Posted Sep 30, 2020
Authored by Haboob Team

Whitepaper that goes over a full attack scenario by getting a foothold through Microsoft Exchange OWA Portal to discover and abuse MSSQL.

tags | paper
SHA-256 | 1e359078a38e5ef9da11966368cd8309e0715ec901171b245500b208e0b296e2
Google Chrome V8 Type Confusion
Posted Jul 27, 2020
Authored by Nayan Das

Whitepaper that discusses CVE-2020-6418 which encapsulates a type confusion vulnerability in V8 in Google Chrome versions prior to 80.0.3987.122.

tags | paper
SHA-256 | 1f3aff5295a783cf0bb41866e3c194712b4267c83fb6e233130408cc4d7c35a4
Cloud As An Attack Platform
Posted Jun 17, 2020
Authored by Akbar Siami Namin, Faranak Abri, Keith S. Jones, Prerit Datta, Moitrayee Chatterjee

This is a whitepaper that presents an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. The researchers presented the participants with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve their understanding of necessary security controls and recommendations regarding precautionary actions to circumvent the exploitation of clouds for malicious activities. They observed that in 93.78% of the responses, participants are abusing cloud services to establish their attack environment and launch attacks.

tags | paper
SHA-256 | 55854ee2c23a225a399933b2397503589cceb96dd36c5a8986a11eb73227e97e
Page 1 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close