exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 87 RSS Feed

Files

xss-walkthrough.txt
Posted Aug 15, 2007
Authored by t0pp8uzz, xprog

Whitepaper entitled "XSS The Complete Walkthrough". Written to discuss how web developers should code securely to negate cross site scripting vulnerabilities.

tags | paper, web, vulnerability, xss
SHA-256 | 49155974d24086509ddb711af7801ff27158e8ee699325d11e5b2a93f9a65bb5

Related Files

tactical_paper.pdf
Posted Aug 10, 2007
Authored by H D Moore, Valsmith | Site metasploit.com

Whitepaper entitled "Tactical Exploitation". This writing discusses a tactical approach to penetration testing that does not rely on exploiting known vulnerabilities. It stems from a talk given at Black Hat 2007 and Defcon 15.

tags | paper, vulnerability
SHA-256 | 63e1873af974293c0c059bd60ed3ba72e9172be14336b903d5d75a8313c75a04
XSSTunnelling.pdf
Posted Jul 11, 2007
Authored by Ferruh Mavituna | Site portcullis-security.com

Whitepaper describing tunneling HTTP traffic via cross site scripting channels.

tags | paper, web, xss
SHA-256 | b6e22346f151eaeb24916f751d3e2467742a870c86d317f9d12104eda70ce14d
xss-bypass.txt
Posted Jun 11, 2007
Authored by Arham Muhammad

Cross site scripting filtration bypass.

tags | paper, xss, bypass
SHA-256 | e8f3a317fec8d9aac454287bcffbd89a86bb81f966319f433900cc50f0f28107
HackingDatabases.zip
Posted Apr 17, 2007
Authored by Cesar Cerrudo

Whitepaper entitled "Hacking Databases For Owning Your Data". This paper goes into specifics on how to compromise MS-SQL and Oracle databases. It includes tools and exploits as well.

tags | exploit
SHA-256 | 4f0613de36a3479fd1e5e7c57266df8715f1eb1c690eea5f55baf65e0ef90793
cursor-injection.pdf
Posted Feb 28, 2007
Authored by David Litchfield | Site databasesecurity.com

Whitepaper entitled "Cursor Injection - A New Method for Exploiting PL/SQL Injection and Potential Defences".

tags | paper, sql injection
SHA-256 | 5e052565e3661c687c0142cb2a857a3b5d8400a27ec65832792185de33fbad3d
RogueXMLSpecific.pdf
Posted Feb 28, 2007
Authored by Aditya Sood | Site zeroknock.metaeye.org

Whitepaper entitled Rogue XML Specifications. It discusses insecurities that relate to XML schema.

tags | paper
SHA-256 | 8f898961deadbbea1e0a38424a21b14dc2cd3202e6954fa1ff015c971451cb97
AmbiguityInAjaxLockdownFramework.pdf
Posted Feb 13, 2007
Authored by Aditya K Sood | Site zeroknock.metaeye.org

Whitepaper entitled Ambiguity In Ajax Lockdown Framework - Unveiling Some Contradictory Facts.

tags | paper, web
SHA-256 | c72d1fdf0586fb064c35e73407382130
xssSplinder.txt
Posted Feb 13, 2007
Authored by phoby

www.splinder.com suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 6c042b9b540a40ea9a4fff8746e2e01d18701d9c89da1d6dbc86aa648cc5d4d3
XSS_Vulnerability_EasymoBlog.txt
Posted Feb 6, 2007
Authored by Tal Argoni | Site zion-security.com

EasyMoblog version 0.5.1 suffers from a cross site scripting vulnerability. Details provided.

tags | exploit, xss
SHA-256 | a6989f7a88416dc8794900029b76069370eb1c18cb0a28e181ff5ef68854b3ee
ExploitingJSON.pdf
Posted Feb 1, 2007
Authored by Aditya K Sood | Site zeroknock.metaeye.org

Whitepaper entitled Exploiting JSON Framework - 7 Attack Shots.

tags | paper
SHA-256 | 4ef0bb62586c04ed3138bfb5fb9552f437721e1488319a608841047e93441684
malware.pdf
Posted Jan 14, 2007
Authored by Nicolas Falliere

Whitepaper entitled "Anatomy of a Malware". A tutorial that was created to educate people on how a simple piece of malware works.

tags | paper, virus
SHA-256 | 5172b6396a1d3bf6c98f00741dec0697cfc325806e2509483c51c1658ee514dc
Windows_Vista_64bits_and_unexported_kernel_symbols.pdf
Posted Jan 3, 2007
Authored by Matthieu Suiche | Site msuiche.net

Whitepaper entitled Windows Vista 64bits And Unexported Kernel Symbols.

tags | paper, kernel
systems | windows
SHA-256 | 2b24f359a718212fdce5611bf648c054d5e5be36b5321038430e4c47d5aad39c
Top_10_Ajax_SH_v1.1.pdf
Posted Dec 6, 2006
Authored by Shreeraj Shah

Whitepaper entitled "Top 10 AJAX Security Holes And Driving Factors".

tags | paper
SHA-256 | 1ed5c65dfd0826c823dfd1a9f124b537e561dd5ffcc62aee60d328f4953f93ef
javacrack.pdf
Posted Nov 27, 2006
Authored by Subere

Whitepaper entitled Cracking String Encrypting in Java Obfuscated Bytecode.

tags | paper, java
SHA-256 | b3a054932b76ff48af0039a46178eecf584bc4eb5e4ead1c864b310c0394d2cb
comparison.pdf
Posted Nov 22, 2006
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled "Which is more secure? Oracle vs. Microsoft". This article looks at the number of security flaws in Oracle and Microsoft database offerings.

tags | paper
SHA-256 | 76b1dff89265c886e4fb95a2da210b637f0ae4d28b78e4ee37976c44012de162
Implementing_And_Detecting_A_PCI_Rootkit.pdf
Posted Nov 18, 2006
Authored by John Heasman | Site ngssoftware.com

Whitepaper entitled "Implementing and Detecting a PCI Rootkit". This paper discusses means of persisting a rootkit on a PCI device containing a flashable expansion ROM.

tags | paper
SHA-256 | 260ded5cc1071aca1b4d5dfacad60c3e7469b9713f06b292531eeef70176c5cd
xssshellv039.zip
Posted Nov 7, 2006
Authored by Ferruh Mavituna | Site ferruh.mavituna.com

XSS Shell is a powerful cross site scripting backdoor. XSS Shell allows interactively getting control over a cross site scripting (XSS) vulnerability in a web application. It demonstrates the real power and damage of cross site scripting attacks.

tags | exploit, web, shell, xss
SHA-256 | c411de524d741e41c5ddc25ec6179dcc18cfa0cb287e87b7c3d0fa34e180fb35
xss-.net.txt
Posted Oct 31, 2006
Authored by ProCheckUp | Site niscc.gov.uk

Applications which fail to provide their own filtering on top of the inbuilt .NET request filtering may be vulnerable to XSS attacks. Provided that a web application solely relies on .NET request filtering before echoing input back to the web browser, it is possible to inject scripting code and successfully launch XSS attacks by submitting a specially crafted request.

tags | advisory, web
SHA-256 | dd910ad2db757329a92d803219be35c477e9961683836178d55fca2a887cde87
xss_research.htm
Posted Jul 20, 2006
Authored by SkyOut | Site core-security.net

This is a huge list of many popular web sites that are susceptible to cross site scripting attacks with links to examples.

tags | exploit, web, xss
SHA-256 | dc68f43e7f38423c3b967f1c5acbfbbfb67b59ed2d10ffba0afd65884a01b955
mobilethreats.tgz
Posted Apr 30, 2006
Authored by Calvin Tang | Site pipx.net

Whitepaper entitled "Summary of Mobile Threat For Year 2005" that provides a detailed analysis of mobile malware and a full understanding of how such virii propagate. Also included is CalvinStinger.SIS which is a disinfection tool for the Symbian S60 platform.

tags | paper, virus
SHA-256 | e539c152ba59e2540ddc231887dd894606a4dec7b799c519d0ed06cee73a609c
WLSI.zip
Posted Mar 15, 2006
Authored by Cesar Cerrudo | Site argeniss.com

Whitepaper entitled "WLSI - Windows Local Shellcode Injection" that describes a new technique to create 100% reliable local exploits for Microsoft Windows operating systems. The technique uses some Windows design weaknesses that allow low privileged processes to insert data into almost any Windows process regardless of their current privilege level. After a brief introduction and a description of the technique, a couple of samples (Exploits for MS05-012 and MS05-040) are included so the reader will be enabled to write their own exploits.

tags | paper, local, shellcode
systems | windows
SHA-256 | 0edd124aeb55cb3125140eb5cdb86f78449fba1ac22466a4b4325fdf39c92857
httpResponseSmuggle.txt
Posted Feb 25, 2006
Authored by Amit Klein

Whitepaper entitled "HTTP Response Smuggling". It discusses evasion techniques to bypass anti-HTTP response splitting strategies.

tags | paper, web
SHA-256 | ee3a42dce4b4f8bc8c2ae652525c238be609475a31e10db164e4648e1e6a3f2f
winval.pdf
Posted Feb 14, 2006
Authored by Sudhakar Govindavajhala, Andrew W. Appel

Whitepaper entitled Windows Access Control Demystified. It discusses some security issues inherent in Microsoft Windows that can allow for local privilege escalation.

tags | paper, local
systems | windows
SHA-256 | 5c643fff89661eb32c0192e07cb5fb805f0bbe3a74916157fb39d3dfd499c98c
InformationSecurity.pdf
Posted Feb 9, 2006
Authored by Mohammad Heydari

Whitepaper entitled "The Role of Modeling and Simulation in Information Security".

tags | paper
SHA-256 | 5f8856fb2b9965e4af48075871fdccda90ef3461fa0ec709beca8292fca13122
aawns.pdf
Posted Jan 29, 2006
Authored by Shane A. Macaulay, Dino A. Dai Zovi

Whitepaper entitled 'Attacking Automatic Wireless Network Selection'.

tags | paper
SHA-256 | 0fab76effc4d98fe89fa651a422e69e400fe3ac37312fd2e5b3e468409306386
Page 3 of 4
Back1234Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close