Whitepaper entitled Internet Banking Flaws In India.
5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.
8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.
cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
Whitepaper entitled HackBack - A DIY Guide.
13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
Banking@Home versions 2.1 and below from Craft Silicon suffer from a remote SQL injection vulnerability.
513ef1eed6f0a7a5b30bd7f163fa42ca82917d2aa564834fd4ce1dcceffdb330
Whitepaper entitled Short Review Of Modern Vulnerability Research.
50f3d7b703ae7599064134dd9771cdf630e1cfeb90294a067782e794b36e361e
Whitepaper entitled Reverse Engineering Microsoft F#.
4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
Whitepaper entitled Format String Exploitation Demonstration [LINUX].
915519f063cd8236fa2caaa14c2c8889ec51bdd79b0d0f3cd8fe31c44d60ccd5
Whitepaper entitled Frame Pointer Overwrite Demonstration [LINUX].
48ec50a815d6f4578f50c4fe6f040b3db9d46a1b0033540beaac9b8253b52617
Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.
33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
Whitepaper entitled Exploration In The Cross Territory, a follow up paper to the Cross Site Scripting - Attack and Defense Guide.
22261dd7d0353e4a08f864b8638db726e06e08be483dedd672758a6b6ec89362
Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.
d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
Whitepaper entitled Protecting A Web Application Against Attacks Through HTML Shared Files.
a332ffa53a93ffea3c43a63213809c1bc705467514a6098021161dd8468c04fb
Whitepaper entitled Advanced application-level OS fingerprinting: Practical approaches and examples.
e7bbfb46c5d92567d485f28a4014af6d68fc50ef1c5709b2306ba11e36be0d3d
Whitepaper entitled SNMP Injection - Achieving Persistent HTML Injection via SNMP on Embedded Devices.
ace95e6e015bcde9714bec5eb0612843f605b3cd71d3b207aaadcab78367c8ad
Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.
1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
Whitepaper entitled Fuzzing: A Useful Approach to Finding Bugs.
9c907cb0d0124b9ee8e6d11b1d8c18b22f0c23181a1bd6ffb8ffffe1f6c43c74
Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.
a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
Whitepaper entitled Adventures with a certain Xen vulnerability (in the PVFB backend).
dc2c1f613ed2294698e11fed5a558cda1fc7acdf157f9e6e5393eec8a6b2f4d5
Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.
010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e
Whitepaper entitled "Secure SMTP Proxy for Protecting Mail Transfer Agents". This is a 70 page document that discusses new angles for defending mail daemons and more.
2f99ebdfed8c9fc33472e8325535722cf2edfec2bccf05e4835912ecc2c62817
Whitepaper entitled "Writing a fuzzer using the Fuzzled framework". The paper includes some of the techniques used to dismantle protocols including documentation, observation and static analysis.
85eff0372eb6b927c7f66e8380f04f54c2152fb1202fd191238c82796096ff34
Whitepaper entitled "Las nuevas backdoors", discussing new techniques in backdoors and sniffing. Written in Spanish.
ad3835828509aa5430280f10dce98cbff07e56d28bf314f1479c5d2519d64339
Whitepaper entitled PHP Endangers - Remote Code Execution.
fc600865f3c5af11188782c06005c01ef0a387a4357eb31725436393278cd10f
Whitepaper entitled "XSS The Complete Walkthrough". Written to discuss how web developers should code securely to negate cross site scripting vulnerabilities.
49155974d24086509ddb711af7801ff27158e8ee699325d11e5b2a93f9a65bb5
Whitepaper entitled "Tactical Exploitation". This writing discusses a tactical approach to penetration testing that does not rely on exploiting known vulnerabilities. It stems from a talk given at Black Hat 2007 and Defcon 15.
63e1873af974293c0c059bd60ed3ba72e9172be14336b903d5d75a8313c75a04