exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files

Forge-Amit.txt
Posted Jul 26, 2006
Authored by Amit Klein

Whitepaper titled "Forging HTTP Request Headers With Flash".

tags | paper, web
SHA-256 | ea05b3536fe449fc3fedd3dda363fbd5f77eefea62b709a6e4e00a23c016c940

Related Files

BLUFFS: Bluetooth Forward And Future Secrecy Attacks And Defenses
Posted Nov 30, 2023
Authored by Daniele Antonioli, Sophia Antipolis

Whitepaper titled BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. It presents six novel attacks affecting chips from many major Bluetooth vendors.

tags | paper
SHA-256 | 348467e3c5ed34a3d7601f57132defd129109109224ba2966ff023f2babfce33
From RFC To RCE 16 Years Later
Posted Jul 11, 2023
Authored by Fabian Hagg | Site sec-consult.com

Whitepaper titled Everyone Knows SAP, Everyone Uses SAP, Everyone Uses RFC, No One Knows RFC: From RFC to RCE 16 Years Later.

tags | paper
SHA-256 | ec3e058c8f83be6779103d8bb8f9cdbd4b8c1663435f67a9d7c36923c7afe54a
CurveBall Windows CryptoAPI Spoofing
Posted Dec 16, 2021
Authored by Payal Mittal

Whitepaper titled CurveBall Windows CryptoAPI Spoofing that discusses the CVE-2021-0601 vulnerability.

tags | paper, spoof
systems | windows
advisories | CVE-2021-0601
SHA-256 | 728bd43bdaed0560d5327ad21645854d75e4367110b510fd004bcf6753926332
ForgeRock Access Manager/OpenAM 14.6.3 Remote Code Execution
Posted Jul 16, 2021
Authored by Photubias

ForgeRock Access Manager/OpenAM version 14.6.3 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2021-35464
SHA-256 | 7ded60e2fee61f85ac83d872fdce902efaac80f0e0a44bbbf62f99b5b122d9e6
Linux Restricted Shell Bypass Guide
Posted May 6, 2018
Authored by n4ckhcker, h4d3sw0rm

Whitepaper titled Linux Restricted Shell Bypass Guide.

tags | paper, shell
systems | linux
SHA-256 | a3d399332420410a30f001d901db1a7ecbec1699d8558be58d4cbb534fcc0b77
Dissecting Blackberry 10 - An Initial Analysis
Posted May 23, 2013
Authored by A. Antukh | Site sec-consult.com

This is a whitepaper titled "Dissecting Blackberry 10 - An Initial Analysis" and discusses the specifics of the Blackberry 10 operating system, fuzzers, dumping the boot sector and other topics.

tags | paper, fuzzer
SHA-256 | 70558b3c822ba1031b30db6cf2441cda58de528f629f8695f4dd323ea389bd4f
breaking-rsa.txt
Posted Nov 15, 2007
Authored by Alex Bassas Serramia

Whitepaper titled Breaking RSA: Totient indirect factorization.

tags | paper
SHA-256 | 6ec72b3df0558322188aaacfe4c6a5da08bb84134c850474aaaa5c66090bd689
protocolhopping.txt
Posted Nov 14, 2007
Authored by Steffen Wendzel | Site wendzel.de

Whitepaper titled Protocol Hopping Covert Channels - Protocol Hopping Covert Channels (PHCC) are a way to realize covert channels that switch between different protocols while a covert channel is established. PHCCs even can use a randomized protocol order and a mixed packet order to transfer packets what makes them hard to detect.

tags | paper, protocol
SHA-256 | 5e860930cb5e0a371339c0311a86cb658c505870ba95e5089106907f07b049f8
cybercrime-electoral-system.pdf
Posted Oct 10, 2007
Authored by Oliver Friedrichs | Site symantec.com

Whitepaper titled Cybercrime and the Electoral System.

tags | paper
SHA-256 | fc2dcd7e071c499f8ddbca1dd9d1ee53828e4e34f0ef7d23ffac7d92a00c8545
Ser_Insec_Bison.pdf
Posted Jul 31, 2007
Authored by Aditya K Sood | Site secniche.org

Whitepaper titled Binary JSON: Insecurity In Implementing Serialization.

tags | paper
SHA-256 | 792f11d34234d4001313b75a5f3a48df168da66310add61910d40a5b0d9c996f
csrf-surf.txt
Posted May 22, 2007
Authored by Nexus | Site playhack.net

Whitepaper titled Cross Site Request Forgery: The Sea Surf.

tags | paper, web, csrf
SHA-256 | 5f2993a62fbb64d5422e96ba9b08bcc4be5bff77401acc7bef23bc85e71da389
execshield.tgz
Posted Apr 19, 2007
Authored by Xpl017Elz | Site inetcop.org

Whitepaper titled 'Advanced Exploitation In Exec-Shield: Fedora Core Case Study". This is an excellent paper and is in both PDF and text formats. Please check it out.

tags | exploit
systems | linux, fedora
SHA-256 | a8e5761dc6549e813b9928348cdf9f0062dfebc993c77dfa6cf7367eb33624af
SyscalltableAMD64EN.txt
Posted Oct 18, 2006
Authored by pouik

Whitepaper titled "How to get sys_call_table on amd64 under Linux".

tags | paper
systems | linux
SHA-256 | 11d6399ff6d685f568357529150b4e34ee0ce5665b5ae70367a50f78b5f900af
vapatch.txt
Posted Oct 9, 2006
Authored by phetips

Whitepaper titled Circumventing the VA kernel patch For Fun and Profit.

tags | paper, kernel
SHA-256 | 44d8fe292dd2dfdf649b23bd3d8ed9ec98592fff15344d63452c38fc5b4fec57
VT-belva-dekay-final.pdf
Posted Aug 29, 2006
Authored by Kenneth F. Belva, Sam H. Dekay | Site ftusecurity.com

Whitepaper titled "Creating Business Through Virtual Trust: How to Gain and Sustain a Competitive Advantage Using Information Security".

tags | paper
SHA-256 | 61c4df4f6cd97bb1f07965a78034ff548b67189ecc2115b7f28bbf34efe4e5d2
filtering-of-icmp-error-messages.pdf
Posted Aug 17, 2006
Authored by Fernando Gont | Site gont.com.ar

Whitepaper titled Filtering Of ICMP Error Messages.

tags | paper
SHA-256 | 3e111b9620bd24f49f6ac3d44f4883f748b6d8dff7a2b8c51a80de079578dd84
bypass_dbms_assert.pdf
Posted Jul 28, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Whitepaper titled "Bypassing Oracle dbms_assert".

tags | paper
SHA-256 | 9f7cfa0b9fa6a325fd9b6f069b22b6795f046e87d923264ea157ee119a0bce84
71.pdf
Posted Jul 15, 2006
Authored by ReZEN

Whitepaper titled 'Web Application Auditing and Exploitation'. It concentrates on the exploitation of PHP based web applications examining various functions and how they can be manipulated.

tags | paper, web, php
SHA-256 | a0857d2f39f7010028385268c7142969653c55870ace87a7b29d7747338937e4
Page 1 of 1
Back1Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close