Whitepaper discussing untrusted data deserialization in jsoniter. Written in Spanish.
bfcbc92c461eee304f389597423031549d816389de0416f3fa662b1cb15e3995
Whitepaper discussing uncommon SQL injection attacks.
c8b16f4bd110529536d9922005f3293bc55cf4684bc2a40dfe6f279a8d8d96d4
Whitepaper discussing the remote exploitation of format string bugs.
e56ac2e283600d4cc1b61d33886eb76a7532991e7f0d2394cec3fa119c1c9887
A small whitepaper discussing code auditing in C.
11fb1c5a2417f1cd02c72bad9316aff637575f8a2d814bd9c9c5aa3d3fff2ca7
Whitepaper discussing cross site request timing attacks. This was originally presented at Black Hat 2007 and Defcon 15.
88fce15c0a9ed8dc4bc6ad55deb64e3a3b97add18472559f9a0f7481f2f6d3d2
Whitepaper discussing how to speed up the exploit development process as presented at VNSECON07.
ffe923e8398e85378151a0b921bace4d2172ba42ed6499ef888c1bdb1b15a5b4
Whitepaper discussing how to chroot SSHd on Linux.
af958cdea0fa1867d95fdc17f44bc811a2067dcfa26bacaf4799298815175996
Whitepaper discussing security implications with PostgreSQL when improperly configured.
394fde0a55e01e4ceacd902f672a2e8f17f90c73974cfcf7a60f272b62d35440
Whitepaper discussing secure file upload in PHP web applications.
c2f310516a6d4d5db4170ff162f315419894a825ccc044c82abbc2e20b2cdee4
Whitepaper discussing Windows DNS cache poisoning by forwarder DNS spoofing.
a8edfacf63fc3159336647ddf759fbe145f1138297489817602d348e2b57d3a4
Brief whitepaper discussing research performed analyzing whether or not a 30 dollar Bluetooth dongle could be transformed into a full blown Bluetooth sniffer.
f3a4af82e005cae51da0d0956e317435cb453b6bea93a309c7b3d0a113cfc977
Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. PDF version.
c0dd9c2daf75d423372e3098be822433dd1a7a63f0118e0a205fe59b2b971571
Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. Text version.
d3019251c4f27b4d2fb8cce28300a408be8e83c9a19904cca9e409520ba51ed4
Whitepaper discussing a serious vulnerability in Google Desktop. The attack is composed of web-application security flaws found in Google Desktop along with exploitation of Google Desktop's tight integration with the Google.com website.
0d0fe93a2dd71d7872267488cb64152eb357a94750078e6b22fbba7faac2a033
Small whitepaper discussing Nessus and the functions related to writing NASL scripts along with some debugging tips.
5dcce405cebc18a2ae6613adf1d60c2234575ab10fafd44022e7bd6710af2778
Small whitepaper discussing how to produce a management-friendly version of nmap output.
8d41930e50e372274a52da913c85b393a87979a3bedd833718862ccafa3061be
Brief whitepaper discussing the hacking of AJAX DWR applications.
6c5d8ba8ddbd21a85894c20cb3d5862246ff8206bb67d1314a13e58a171b8c3e
Whitepaper discussing attack vectors for Web 2.0 applications. Web 2.0 is the novel term coined for new generation Web applications. /start.com/, /Google maps/, /Writely/ and /MySpace.com/ are a few examples. The shifting technological landscape is the driving force behind these Web 2.0 applications. On the one hand are Web services that are empowering server-side core technology components and on the other hand are AJAX and Rich Internet Application (RIA) clients that are enhancing client-end interfaces in the browser itself. XML is making a significant impact at both /presentation/ and /transport/ (HTTP/HTTPS) layers. To some extent XML is replacing HTML at the presentation layer while SOAP is becoming the XML-based transport mechanism of choice.
23b78dfb2fcd2a2e7ec93abd2ab89b20a676a3f0dfa6408fc46bf16a6cdd1988
Short whitepaper discussing API hooking/interception via DLL redirection.
4f3b2999eaf8674d18053e9c19ddc2690f09ca07ac557ea9d739cbee813c6366
Whitepaper discussing the hardening of Windows NT.
c3dfdf7d4262a082864c40fbf2504b64c0e76d0094696de67110b38577ff0649
The Final Nail In WEP's Coffin - Whitepaper discussing fragmentation attacks against WEP.
3aebe114f12ff0ba692be5c3d7b63553d1742f4a3322235f3d80c2eadcf161c8
Whitepaper discussing the bypassing of script filter with variable-width encodings.
3f758cdb2a9ed75213ae2fa409be10c8c8b216d0491636c6a61a4c332194a72f
Whitepaper discussing the methodology demonstrated in the Microsoft PowerPoint 2003 SP2 exploit.
18a9798ab16576aac7dac8c0da34b42161c5b9e5254fbcaf52a8ec462748cf7f
Whitepaper discussing how to generate runtime call graphs using certain GCC features.
4d10085768771f85a4a59ba1019a21073548bb46219ab3fc29520dcb7a124397
Small whitepaper discussing how to use payload rewriting to exploit remote buffer overflow vulnerabilities.
0f69f97a695d554036455180134044f578440c4022112040028883dd582a2d05
Whitepaper discussing cracking basics.
3da459b607b000828f4c5f52483c9fa63dcd11949b7f79f0e54d8ec5ec13d329