exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files

Bypassing_NAC_Solutions_Whitepaper.pdf
Posted Sep 26, 2006
Authored by Ofir Arkin | Site insightix.com

Bypassing network access control (NAC) systems - This whitepaper examines the different strategies used to provide network access controls. The flaws associated with the different network access control (NAC) solutions are also presented. These flaws allow the complete bypass of each and every NAC mechanism currently offered on the market.

tags | paper
SHA-256 | 7dc8e38caef9108f721a21493544a4ba21ddafddf32210c7962320556e319394

Related Files

SAP Hybris eCommerce Server-Side Request Forgery
Posted Jun 15, 2021
Authored by Gaston Traberg | Site onapsis.com

An unauthenticated server-side request forgery vulnerability exists in SAP Hybris acceleratorservices. This means that anyone accessing this extension is able to use it to make arbitrary HTTP requests, bypassing network restrictions. Versions affected include 1808, 1811, 1905, and 2005.

tags | advisory, web, arbitrary
advisories | CVE-2020-26811
SHA-256 | b53e0a33c20b6b6c42760d7b7dbb5e3ba1657246bda4b65bb14054a620c16d7d
Bypassing Certificate Pinning In Modern Android Application Via Custom Root CA
Posted Aug 20, 2020
Authored by Nghia Van Le

This document is intended to provide detailed instructions for bypassing certificate pinning via a custom Root CA. It covers all the required topics for understanding this method.

tags | paper, root
SHA-256 | e451c3653c39f8c69197cc44125ea0be0963f12054cce2cca25c7696dab74b07
Bypassing A Null Byte POP/POP/RET Sequence
Posted Dec 25, 2019
Authored by FULLSHADE

This whitepaper covers a new technique that utilizes DLL injection to inject a custom DLL into a running vulnerable process to add a POP POP RET sequence in the scenario that the vulnerable program does not include any null byte free sequences. This is a useful technique to exploit SEH buffer overflow attacks successfully.

tags | paper, overflow
SHA-256 | 74df8ee5ae7f9410a55a3ced1546454f896ed3cdd356c8ffd56a51dee01fc0db
Bypassing NoScript Security Suite Using XSS And MITM Attacks
Posted Mar 18, 2016
Authored by Mazin Ahmed

This paper discusses different techniques that an attacker can use to bypass NoScript Security Suite Protection. These techniques can be used by malicious vectors in bypassing the default installation of NoScript. The paper also provides solutions and recommendations for end-users that can enhances the current protection of NoScript Security Suite.

tags | paper
SHA-256 | 5f37e8e3412f1440fa6c6a360ed379f128cc4ea278c023e5f3855760b77ba3a5
Bypassing Address Space Layout Randomization
Posted Apr 16, 2012
Authored by TheXero | Site nullsecurity.net

Most modern day Operating Systems include some form of memory protection such as DEP and ASLR. This article focuses on ASLR, its implementation, limitations and finally various techniques which can be used to circumvent the protection.

tags | paper
SHA-256 | de3faada87e1bd7b6c844f2b8479cf643993f49918b07823dfb93f24683b904d
Bypassing tolower() Filters In Buffer Overflows
Posted Mar 30, 2012
Authored by localh0t

This whitepaper goes into detail on how to bypass tolower() filters in buffer overflows. It uses a stack-based buffer overflow as an example but the technique can also be applied to heap overflows as well.

tags | paper, overflow
SHA-256 | db7da31673402422788bf435e51bb26cce80674800f01ecfb89ff9f49608d751
Bypassing PHPIDS 0.6.5
Posted Aug 26, 2011
Authored by Michael Brooks

Using the attacks in this paper allows you to bypass all of PHPIDS's rule sets, which defeats all protection PHPIDS can provide. Furthermore, on a default install of PHPIDS the log file can be used to drop a PHP backdoor. This can use PHPIDS as a vital steping stone in turning an LFI vulnerability into remote code execution. The end result is that use of PHPIDS 0.6.5 can make you less secure. All of these issues have been fixed in version 0.7.

tags | paper, remote, php, code execution
SHA-256 | 4e80f010f2e100b6cc954b44c4b4a7f65f2ce4d15ff9f32967990f6eb5333cab
Bypassing Anti-Virus Scanners
Posted Mar 29, 2011
Authored by MaXe

Whitepaper called Bypassing Anti-Virus Scanners.

tags | paper, virus
SHA-256 | 8919103e539f8e08d30103803a77e6ad632dce79dedb8e58ee5be3b8dbcbf8c6
Bypassing Browser Memory Protections
Posted Jan 6, 2011
Authored by Mark Dowd, Alexander Sotirov

Whitepaper called Bypassing Browser Memory Protections.

tags | paper
SHA-256 | 4bb235b44799001d4a44274262b9d944e99bca3cb5b4c65e5344121784a5e29e
Google Chrome 4 Javascript Filter Bypass
Posted May 27, 2010
Authored by Manuel Fernandez

Google Chrome 4 suffers from a javascript filter bypass vulnerability.

tags | exploit, javascript, bypass
SHA-256 | 055757eecd2c55b15308e775bf09cd18f72a6a408a88dc2fa420e7ce3f0a65e2
Bypassing Oracle DBMS_ASSERT
Posted Aug 25, 2009
Authored by David Litchfield | Site ngssoftware.com

Whitepaper called Bypassing Oracle DBMS_ASSERT (in certain situations). Originally written in July of 2008 but is just being released now.

tags | paper
SHA-256 | e6e1d68c71f6151caeb0c9cf0b475ad6bbf96d0a3d4464eca34740718a6b39f8
Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf
Posted May 29, 2008
Authored by Arshan Dabirsiaghi

Whitepaper called Bypassing URL Authentication and Authorization with HTTP Verb Tampering.

tags | paper, web
SHA-256 | 89c79276bb60d2a827a2b05125ffbdfb1c71292138a852beeb9e94a711e853bb
bypassing-servlet.txt
Posted Aug 14, 2007
Authored by Meder Kydyraliev | Site o0o.nu

OWASP Stinger and Struts servlet input validation filters suffer from a bypass vulnerability.

tags | advisory, bypass
SHA-256 | 03451f25df2b90ee11c15c5234a31fe6413bc3463e77a6f3140b03dc0f79b315
bypassing-pwf-hips.txt
Posted May 17, 2007
Site matousec.com

A flaw with how various personal firewalls and HIPS software use process identifiers in Microsoft Windows allows for complete bypass. Comodo Firewall Pro 2.4.18.184, Comodo Personal Firewall 2.3.6.81, and ZoneAlarm Pro 6.1.744.001 are some of the products affected.

tags | advisory
systems | windows
SHA-256 | a08b2e81d6fcc34325cc87218835cf89eb4ed2768bb3e42846f83adf580d458c
bypassing-win-heap-protections.pdf
Posted Aug 17, 2005
Authored by Nicolas Falliere

Whitepaper detailing a new way to bypass Microsoft Windows heap protection mechanisms. The methodology explained here is different from the method introduced by Alexander Anisimov.

tags | paper
systems | windows
SHA-256 | 9a61e882adb5edb01d3de81fa7a37d2cd965a7b01614922c1ceb92e45f8a1500
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close