Whitepaper titled "Forging HTTP Request Headers With Flash".
ea05b3536fe449fc3fedd3dda363fbd5f77eefea62b709a6e4e00a23c016c940
Whitepaper titled BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. It presents six novel attacks affecting chips from many major Bluetooth vendors.
348467e3c5ed34a3d7601f57132defd129109109224ba2966ff023f2babfce33
Whitepaper titled Everyone Knows SAP, Everyone Uses SAP, Everyone Uses RFC, No One Knows RFC: From RFC to RCE 16 Years Later.
ec3e058c8f83be6779103d8bb8f9cdbd4b8c1663435f67a9d7c36923c7afe54a
Whitepaper titled CurveBall Windows CryptoAPI Spoofing that discusses the CVE-2021-0601 vulnerability.
728bd43bdaed0560d5327ad21645854d75e4367110b510fd004bcf6753926332
ForgeRock Access Manager/OpenAM version 14.6.3 unauthenticated remote code execution exploit.
7ded60e2fee61f85ac83d872fdce902efaac80f0e0a44bbbf62f99b5b122d9e6
Whitepaper titled Linux Restricted Shell Bypass Guide.
a3d399332420410a30f001d901db1a7ecbec1699d8558be58d4cbb534fcc0b77
This is a whitepaper titled "Dissecting Blackberry 10 - An Initial Analysis" and discusses the specifics of the Blackberry 10 operating system, fuzzers, dumping the boot sector and other topics.
70558b3c822ba1031b30db6cf2441cda58de528f629f8695f4dd323ea389bd4f
Whitepaper titled Breaking RSA: Totient indirect factorization.
6ec72b3df0558322188aaacfe4c6a5da08bb84134c850474aaaa5c66090bd689
Whitepaper titled Protocol Hopping Covert Channels - Protocol Hopping Covert Channels (PHCC) are a way to realize covert channels that switch between different protocols while a covert channel is established. PHCCs even can use a randomized protocol order and a mixed packet order to transfer packets what makes them hard to detect.
5e860930cb5e0a371339c0311a86cb658c505870ba95e5089106907f07b049f8
Whitepaper titled Cybercrime and the Electoral System.
fc2dcd7e071c499f8ddbca1dd9d1ee53828e4e34f0ef7d23ffac7d92a00c8545
Whitepaper titled Binary JSON: Insecurity In Implementing Serialization.
792f11d34234d4001313b75a5f3a48df168da66310add61910d40a5b0d9c996f
Whitepaper titled Cross Site Request Forgery: The Sea Surf.
5f2993a62fbb64d5422e96ba9b08bcc4be5bff77401acc7bef23bc85e71da389
Whitepaper titled 'Advanced Exploitation In Exec-Shield: Fedora Core Case Study". This is an excellent paper and is in both PDF and text formats. Please check it out.
a8e5761dc6549e813b9928348cdf9f0062dfebc993c77dfa6cf7367eb33624af
Whitepaper titled "How to get sys_call_table on amd64 under Linux".
11d6399ff6d685f568357529150b4e34ee0ce5665b5ae70367a50f78b5f900af
Whitepaper titled Circumventing the VA kernel patch For Fun and Profit.
44d8fe292dd2dfdf649b23bd3d8ed9ec98592fff15344d63452c38fc5b4fec57
Whitepaper titled "Creating Business Through Virtual Trust: How to Gain and Sustain a Competitive Advantage Using Information Security".
61c4df4f6cd97bb1f07965a78034ff548b67189ecc2115b7f28bbf34efe4e5d2
Whitepaper titled Filtering Of ICMP Error Messages.
3e111b9620bd24f49f6ac3d44f4883f748b6d8dff7a2b8c51a80de079578dd84
Whitepaper titled "Bypassing Oracle dbms_assert".
9f7cfa0b9fa6a325fd9b6f069b22b6795f046e87d923264ea157ee119a0bce84
Whitepaper titled 'Web Application Auditing and Exploitation'. It concentrates on the exploitation of PHP based web applications examining various functions and how they can be manipulated.
a0857d2f39f7010028385268c7142969653c55870ace87a7b29d7747338937e4