what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Untrusted Data Deserialization In Jsoniter
Posted Dec 16, 2021
Authored by Adi Malyanker, Ivan Reyes

Whitepaper discussing untrusted data deserialization in jsoniter. Written in Spanish.

tags | paper
SHA-256 | bfcbc92c461eee304f389597423031549d816389de0416f3fa662b1cb15e3995

Related Files

sql-inject.pdf
Posted Aug 15, 2007
Authored by N3T D3VIL

Whitepaper discussing uncommon SQL injection attacks.

tags | paper, sql injection
SHA-256 | c8b16f4bd110529536d9922005f3293bc55cf4684bc2a40dfe6f279a8d8d96d4
exploit_remote_fmtstring.txt
Posted Aug 11, 2007
Authored by skew

Whitepaper discussing the remote exploitation of format string bugs.

tags | paper, remote
SHA-256 | e56ac2e283600d4cc1b61d33886eb76a7532991e7f0d2394cec3fa119c1c9887
code_auditing_in_c.txt
Posted Aug 11, 2007
Authored by Tal0n

A small whitepaper discussing code auditing in C.

tags | paper
SHA-256 | 11fb1c5a2417f1cd02c72bad9316aff637575f8a2d814bd9c9c5aa3d3fff2ca7
dc-15-meer_and_slaviero-WP.pdf
Posted Aug 11, 2007
Authored by Haroon Meer, Marco Slaviero | Site sensepost.com

Whitepaper discussing cross site request timing attacks. This was originally presented at Black Hat 2007 and Defcon 15.

tags | paper
SHA-256 | 88fce15c0a9ed8dc4bc6ad55deb64e3a3b97add18472559f9a0f7481f2f6d3d2
VNSECON07-JA-Exploit_development.pdf
Posted Aug 10, 2007
Authored by Jerome Athias

Whitepaper discussing how to speed up the exploit development process as presented at VNSECON07.

tags | paper
SHA-256 | ffe923e8398e85378151a0b921bace4d2172ba42ed6499ef888c1bdb1b15a5b4
chroot_sshd_linux.pdf
Posted Jul 13, 2007
Authored by Paul Sebastian Ziegler | Site observed.de

Whitepaper discussing how to chroot SSHd on Linux.

tags | paper
systems | linux
SHA-256 | af958cdea0fa1867d95fdc17f44bc811a2067dcfa26bacaf4799298815175996
Having_Fun_With_PostgreSQL.txt
Posted Jun 19, 2007
Authored by Nico Leidecker | Site leidecker.info

Whitepaper discussing security implications with PostgreSQL when improperly configured.

tags | paper
SHA-256 | 394fde0a55e01e4ceacd902f672a2e8f17f90c73974cfcf7a60f272b62d35440
php-file-upload.pdf
Posted Jun 15, 2007
Authored by Alla Bezroutchko | Site scanit.be

Whitepaper discussing secure file upload in PHP web applications.

tags | paper, web, php, file upload
SHA-256 | c2f310516a6d4d5db4170ff162f315419894a825ccc044c82abbc2e20b2cdee4
dns-poison.txt
Posted Apr 17, 2007
Authored by Makoto Shiotsuki

Whitepaper discussing Windows DNS cache poisoning by forwarder DNS spoofing.

tags | paper, spoof
systems | windows
SHA-256 | a8edfacf63fc3159336647ddf759fbe145f1138297489817602d348e2b57d3a4
busting_bluetooth_myth.pdf
Posted Apr 2, 2007
Authored by Max Moser | Site remote-exploit.org

Brief whitepaper discussing research performed analyzing whether or not a 30 dollar Bluetooth dongle could be transformed into a full blown Bluetooth sniffer.

tags | paper
SHA-256 | f3a4af82e005cae51da0d0956e317435cb453b6bea93a309c7b3d0a113cfc977
Port Scanning Techniques Whitepaper
Posted Mar 9, 2007
Authored by Kris Katterjohn

Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. PDF version.

tags | paper
SHA-256 | c0dd9c2daf75d423372e3098be822433dd1a7a63f0118e0a205fe59b2b971571
Port Scanning Techniques Whitepaper
Posted Mar 9, 2007
Authored by Kris Katterjohn

Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. Text version.

tags | paper
SHA-256 | d3019251c4f27b4d2fb8cce28300a408be8e83c9a19904cca9e409520ba51ed4
Overtaking-Google-Desktop.pdf
Posted Feb 24, 2007
Authored by Yair Amit | Site watchfire.com

Whitepaper discussing a serious vulnerability in Google Desktop. The attack is composed of web-application security flaws found in Google Desktop along with exploitation of Google Desktop's tight integration with the Google.com website.

tags | paper, web
SHA-256 | 0d0fe93a2dd71d7872267488cb64152eb357a94750078e6b22fbba7faac2a033
Writing_nasl_scripts.pdf
Posted Jan 29, 2007
Authored by Hemil Shah

Small whitepaper discussing Nessus and the functions related to writing NASL scripts along with some debugging tips.

tags | paper
SHA-256 | 5dcce405cebc18a2ae6613adf1d60c2234575ab10fafd44022e7bd6710af2778
nmapxmlprettyprint.pdf
Posted Jan 4, 2007
Authored by Thomas J. Munn

Small whitepaper discussing how to produce a management-friendly version of nmap output.

tags | paper
SHA-256 | 8d41930e50e372274a52da913c85b393a87979a3bedd833718862ccafa3061be
ajax-attack.txt
Posted Jan 4, 2007
Authored by Amichai Shulman, Guy Karlebach

Brief whitepaper discussing the hacking of AJAX DWR applications.

tags | paper
SHA-256 | 6c5d8ba8ddbd21a85894c20cb3d5862246ff8206bb67d1314a13e58a171b8c3e
Top10_Web2.0-AV.pdf
Posted Nov 7, 2006
Authored by Shreeraj Shah

Whitepaper discussing attack vectors for Web 2.0 applications. Web 2.0 is the novel term coined for new generation Web applications. /start.com/, /Google maps/, /Writely/ and /MySpace.com/ are a few examples. The shifting technological landscape is the driving force behind these Web 2.0 applications. On the one hand are Web services that are empowering server-side core technology components and on the other hand are AJAX and Rich Internet Application (RIA) clients that are enhancing client-end interfaces in the browser itself. XML is making a significant impact at both /presentation/ and /transport/ (HTTP/HTTPS) layers. To some extent XML is replacing HTML at the presentation layer while SOAP is becoming the XML-based transport mechanism of choice.

tags | paper, web
SHA-256 | 23b78dfb2fcd2a2e7ec93abd2ab89b20a676a3f0dfa6408fc46bf16a6cdd1988
intercept_apis_dll_redirection.pdf
Posted Nov 6, 2006
Authored by Craig Heffner | Site craigheffner.com

Short whitepaper discussing API hooking/interception via DLL redirection.

tags | paper
SHA-256 | 4f3b2999eaf8674d18053e9c19ddc2690f09ca07ac557ea9d739cbee813c6366
NTharden.pdf
Posted Aug 27, 2006
Authored by Aelphaeis Mangarae | Site securzone.org

Whitepaper discussing the hardening of Windows NT.

tags | paper
systems | windows
SHA-256 | c3dfdf7d4262a082864c40fbf2504b64c0e76d0094696de67110b38577ff0649
fragmentation.pdf
Posted Aug 27, 2006
Authored by Andrea Bittau, Mark Handley, Joshua Lackey

The Final Nail In WEP's Coffin - Whitepaper discussing fragmentation attacks against WEP.

tags | paper
SHA-256 | 3aebe114f12ff0ba692be5c3d7b63553d1742f4a3322235f3d80c2eadcf161c8
bypassScript.txt
Posted Aug 18, 2006
Authored by Cheng Peng Su

Whitepaper discussing the bypassing of script filter with variable-width encodings.

tags | paper
SHA-256 | 3f758cdb2a9ed75213ae2fa409be10c8c8b216d0491636c6a61a4c332194a72f
PP2003sp2patched_fr_exploit-method.txt
Posted Aug 17, 2006
Authored by NSRocket

Whitepaper discussing the methodology demonstrated in the Microsoft PowerPoint 2003 SP2 exploit.

tags | paper
SHA-256 | 18a9798ab16576aac7dac8c0da34b42161c5b9e5254fbcaf52a8ec462748cf7f
instrumental.pdf
Posted Jun 27, 2006
Authored by Sebastian Krahmer

Whitepaper discussing how to generate runtime call graphs using certain GCC features.

tags | paper
SHA-256 | 4d10085768771f85a4a59ba1019a21073548bb46219ab3fc29520dcb7a124397
payload-rewrite_exploit.txt
Posted Jun 26, 2006
Authored by poplix

Small whitepaper discussing how to use payload rewriting to exploit remote buffer overflow vulnerabilities.

tags | paper, remote, overflow, vulnerability
SHA-256 | 0f69f97a695d554036455180134044f578440c4022112040028883dd582a2d05
cracking-basics.pdf
Posted May 5, 2003
Authored by Livewire

Whitepaper discussing cracking basics.

tags | paper
SHA-256 | 3da459b607b000828f4c5f52483c9fa63dcd11949b7f79f0e54d8ec5ec13d329
Page 4 of 4
Back1234Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close