what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed


Posted Feb 9, 2006
Authored by Mohammad Heydari

Whitepaper entitled "The Role of Modeling and Simulation in Information Security".

tags | paper
SHA-256 | 5f8856fb2b9965e4af48075871fdccda90ef3461fa0ec709beca8292fca13122

Related Files

Posted Apr 17, 2007
Authored by Cesar Cerrudo

Whitepaper entitled "Hacking Databases For Owning Your Data". This paper goes into specifics on how to compromise MS-SQL and Oracle databases. It includes tools and exploits as well.

tags | exploit
SHA-256 | 4f0613de36a3479fd1e5e7c57266df8715f1eb1c690eea5f55baf65e0ef90793
Posted Feb 28, 2007
Authored by David Litchfield | Site databasesecurity.com

Whitepaper entitled "Cursor Injection - A New Method for Exploiting PL/SQL Injection and Potential Defences".

tags | paper, sql injection
SHA-256 | 5e052565e3661c687c0142cb2a857a3b5d8400a27ec65832792185de33fbad3d
Posted Feb 28, 2007
Authored by Aditya Sood | Site zeroknock.metaeye.org

Whitepaper entitled Rogue XML Specifications. It discusses insecurities that relate to XML schema.

tags | paper
SHA-256 | 8f898961deadbbea1e0a38424a21b14dc2cd3202e6954fa1ff015c971451cb97
Posted Feb 13, 2007
Authored by Aditya K Sood | Site zeroknock.metaeye.org

Whitepaper entitled Ambiguity In Ajax Lockdown Framework - Unveiling Some Contradictory Facts.

tags | paper, web
SHA-256 | c72d1fdf0586fb064c35e73407382130
Posted Feb 1, 2007
Authored by Aditya K Sood | Site zeroknock.metaeye.org

Whitepaper entitled Exploiting JSON Framework - 7 Attack Shots.

tags | paper
SHA-256 | 4ef0bb62586c04ed3138bfb5fb9552f437721e1488319a608841047e93441684
Posted Jan 14, 2007
Authored by Nicolas Falliere

Whitepaper entitled "Anatomy of a Malware". A tutorial that was created to educate people on how a simple piece of malware works.

tags | paper, virus
SHA-256 | 5172b6396a1d3bf6c98f00741dec0697cfc325806e2509483c51c1658ee514dc
Posted Jan 3, 2007
Authored by Matthieu Suiche | Site msuiche.net

Whitepaper entitled Windows Vista 64bits And Unexported Kernel Symbols.

tags | paper, kernel
systems | windows
SHA-256 | 2b24f359a718212fdce5611bf648c054d5e5be36b5321038430e4c47d5aad39c
Posted Dec 6, 2006
Authored by Shreeraj Shah

Whitepaper entitled "Top 10 AJAX Security Holes And Driving Factors".

tags | paper
SHA-256 | 1ed5c65dfd0826c823dfd1a9f124b537e561dd5ffcc62aee60d328f4953f93ef
Posted Nov 27, 2006
Authored by Subere

Whitepaper entitled Cracking String Encrypting in Java Obfuscated Bytecode.

tags | paper, java
SHA-256 | b3a054932b76ff48af0039a46178eecf584bc4eb5e4ead1c864b310c0394d2cb
Posted Nov 22, 2006
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled "Which is more secure? Oracle vs. Microsoft". This article looks at the number of security flaws in Oracle and Microsoft database offerings.

tags | paper
SHA-256 | 76b1dff89265c886e4fb95a2da210b637f0ae4d28b78e4ee37976c44012de162
Posted Nov 18, 2006
Authored by John Heasman | Site ngssoftware.com

Whitepaper entitled "Implementing and Detecting a PCI Rootkit". This paper discusses means of persisting a rootkit on a PCI device containing a flashable expansion ROM.

tags | paper
SHA-256 | 260ded5cc1071aca1b4d5dfacad60c3e7469b9713f06b292531eeef70176c5cd
Posted Apr 30, 2006
Authored by Calvin Tang | Site pipx.net

Whitepaper entitled "Summary of Mobile Threat For Year 2005" that provides a detailed analysis of mobile malware and a full understanding of how such virii propagate. Also included is CalvinStinger.SIS which is a disinfection tool for the Symbian S60 platform.

tags | paper, virus
SHA-256 | e539c152ba59e2540ddc231887dd894606a4dec7b799c519d0ed06cee73a609c
Posted Mar 15, 2006
Authored by Cesar Cerrudo | Site argeniss.com

Whitepaper entitled "WLSI - Windows Local Shellcode Injection" that describes a new technique to create 100% reliable local exploits for Microsoft Windows operating systems. The technique uses some Windows design weaknesses that allow low privileged processes to insert data into almost any Windows process regardless of their current privilege level. After a brief introduction and a description of the technique, a couple of samples (Exploits for MS05-012 and MS05-040) are included so the reader will be enabled to write their own exploits.

tags | paper, local, shellcode
systems | windows
SHA-256 | 0edd124aeb55cb3125140eb5cdb86f78449fba1ac22466a4b4325fdf39c92857
Posted Feb 25, 2006
Authored by Amit Klein

Whitepaper entitled "HTTP Response Smuggling". It discusses evasion techniques to bypass anti-HTTP response splitting strategies.

tags | paper, web
SHA-256 | ee3a42dce4b4f8bc8c2ae652525c238be609475a31e10db164e4648e1e6a3f2f
Posted Feb 14, 2006
Authored by Sudhakar Govindavajhala, Andrew W. Appel

Whitepaper entitled Windows Access Control Demystified. It discusses some security issues inherent in Microsoft Windows that can allow for local privilege escalation.

tags | paper, local
systems | windows
SHA-256 | 5c643fff89661eb32c0192e07cb5fb805f0bbe3a74916157fb39d3dfd499c98c
Posted Jan 29, 2006
Authored by Shane A. Macaulay, Dino A. Dai Zovi

Whitepaper entitled 'Attacking Automatic Wireless Network Selection'.

tags | paper
SHA-256 | 0fab76effc4d98fe89fa651a422e69e400fe3ac37312fd2e5b3e468409306386
Posted Dec 18, 2005
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled 'An Introduction To Heap Overflows On AIX 5.3L'.

tags | paper, overflow
systems | aix
SHA-256 | 7fe6d39248e544c8e5b6ebe39fa4a017668634c3582f64b4ab78f3a53fbf39b8
Posted Dec 7, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper entitled 'Web Application Footprinting and Assessment with MSN Search Tricks'.

tags | paper, web
SHA-256 | 21fa9f7a4c5cc5110927a0d58b634ca2cc3a52a3998262dfccb65e1141516e43
Posted Nov 20, 2005
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled "Database Servers on Windows XP and the Unintended Consequences of Simple File Sharing".

tags | paper
systems | windows
SHA-256 | 961bfed777c65e67a52ff50f80f30cc3225bb5fe84c5ae0b939ca30c781b8ef4
Posted Oct 6, 2005
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled 'Data-Mining With SQL Injection and Inference'. Paper is based on a talk given earlier this year at Blackhat Europe. It divides SQL injection data theft attacks into three classes - inband, out-of-band and inference. The first, in-band, uses the existing connection to get data out; the second, out-of-band, uses another channel, e.g. smtp by using builtin database mail functions; and lastly inference.

tags | paper, sql injection
SHA-256 | fcb6268f83b03e6bae5da741f0a4a4a70ef1f3e89a8ac16c3c1c47f83e4853f6
Posted Oct 6, 2005
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled 'Buffer Underruns, DEP, ASLR, and improving the Exploitation Prevention Mechanisms (XPMs) on the Windows platform'.

tags | paper
systems | windows
SHA-256 | 6a2fef57985b54e3b9a2d601af88045009dd270ff00aa613302b46f9fe35639b
Posted Sep 26, 2005
Authored by Amit Klein

Whitepaper entitled "Exploiting the XmlHttpRequest object in IE - Referrer spoofing, and a lot more."

tags | paper, spoof
SHA-256 | f9a2ac7567ed51e0a9e6e4ff4008bf10f202d346e42b74a07fdaa5b5d39e055f
Posted Aug 5, 2005
Authored by Yuri Gushin | Site ecl-labs.org

Whitepaper entitled 'NIDS Polymorphic Evasion - The End?'. This paper explains how even the most modern of NIDS fail to detect polymorphic shellcode.

tags | paper, shellcode
SHA-256 | 3c6e4f916e13381251401f462b3e2128ca6d50fa3050aa9efdad122aee3d6e88
Posted Jul 14, 2005
Authored by Ashish Anand | Site ashishanand2.tripod.com

Whitepaper entitled Application Level Cryptography: Combination Stream And Block Ciphering Using Double Encryption Algorithms.

tags | paper
SHA-256 | 54d5e2cd2f382e5bab89c50c763f3a086a983c656a1aa1b329596d85ebac7bb1
Page 2 of 2

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By