exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 50 RSS Feed

Files

banking-flaws.pdf
Posted Nov 4, 2008
Authored by webDEViL

Whitepaper entitled Internet Banking Flaws In India.

tags | paper
SHA-256 | 5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920

Related Files

HackBack - A DIY Guide For Those Without The Patience To Wait For Whistleblowers
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.

tags | paper
SHA-256 | 8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
HackBack - A DIY Guide, Spanish Version
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.

tags | paper
SHA-256 | cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
HackBack - A DIY Guide
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide.

tags | paper
SHA-256 | 13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
Craft Silicon Banking@Home SQL Injection
Posted Feb 10, 2009
Authored by Francesco Bianchino

Banking@Home versions 2.1 and below from Craft Silicon suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 513ef1eed6f0a7a5b30bd7f163fa42ca82917d2aa564834fd4ce1dcceffdb330
Whitepaper - Short Review Of Modern Vulnerability Research
Posted Jan 12, 2009
Authored by Michal Bucko | Site eleytt.com

Whitepaper entitled Short Review Of Modern Vulnerability Research.

tags | paper
SHA-256 | 50f3d7b703ae7599064134dd9771cdf630e1cfeb90294a067782e794b36e361e
fsharp-reverse.pdf
Posted Dec 3, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Reverse Engineering Microsoft F#.

tags | paper
SHA-256 | 4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
format-string-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Format String Exploitation Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 915519f063cd8236fa2caaa14c2c8889ec51bdd79b0d0f3cd8fe31c44d60ccd5
frame-pointer-overwrite-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Frame Pointer Overwrite Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 48ec50a815d6f4578f50c4fe6f040b3db9d46a1b0033540beaac9b8253b52617
java2-malware.pdf
Posted Nov 20, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.

tags | paper, java
SHA-256 | 33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
exploration.pdf
Posted Nov 12, 2008
Authored by Xylitol | Site xylitol.free.fr

Whitepaper entitled Exploration In The Cross Territory, a follow up paper to the Cross Site Scripting - Attack and Defense Guide.

tags | paper, xss
SHA-256 | 22261dd7d0353e4a08f864b8638db726e06e08be483dedd672758a6b6ec89362
domain-traversal.pdf
Posted Nov 9, 2008
Authored by hkm

Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.

tags | paper, file inclusion
SHA-256 | d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
file_sharing_security.pdf
Posted Nov 8, 2008
Authored by Francis Corella | Site pomcor.com

Whitepaper entitled Protecting A Web Application Against Attacks Through HTML Shared Files.

tags | paper, web
SHA-256 | a332ffa53a93ffea3c43a63213809c1bc705467514a6098021161dd8468c04fb
appOSfingerprint.txt
Posted Oct 30, 2008
Authored by Dan Crowley

Whitepaper entitled Advanced application-level OS fingerprinting: Practical approaches and examples.

tags | paper
SHA-256 | e7bbfb46c5d92567d485f28a4014af6d68fc50ef1c5709b2306ba11e36be0d3d
SNMP_injection.pdf
Posted Oct 22, 2008
Authored by Adrian Pastor | Site procheckup.com

Whitepaper entitled SNMP Injection - Achieving Persistent HTML Injection via SNMP on Embedded Devices.

tags | paper
SHA-256 | ace95e6e015bcde9714bec5eb0612843f605b3cd71d3b207aaadcab78367c8ad
2008-esorics.pdf
Posted Oct 22, 2008
Authored by flaviog, petervr, ronny, bart, gkoningg, rmuijrer, rverdult

Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.

tags | paper
SHA-256 | 1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
fuzzing-auatfb.pdf
Posted Oct 21, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Fuzzing: A Useful Approach to Finding Bugs.

tags | paper
SHA-256 | 9c907cb0d0124b9ee8e6d11b1d8c18b22f0c23181a1bd6ffb8ffffe1f6c43c74
Detecting_and_Exploiting_ActiveX_Controls.pdf
Posted Oct 20, 2008
Authored by Shahriyar Jalayeri

Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.

tags | paper, vulnerability, activex
SHA-256 | a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
xenfb-adventures-10.pdf
Posted Oct 16, 2008
Authored by Rafal Wojtczuk

Whitepaper entitled Adventures with a certain Xen vulnerability (in the PVFB backend).

tags | paper
advisories | CVE-2008-1943
SHA-256 | dc2c1f613ed2294698e11fed5a558cda1fc7acdf157f9e6e5393eec8a6b2f4d5
Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site irmplc.com

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
SHA-256 | 010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e
secure_smtp_proxy_for_protecting_mta.tar.gz
Posted Sep 6, 2007
Authored by Alin-Adrian Anton

Whitepaper entitled "Secure SMTP Proxy for Protecting Mail Transfer Agents". This is a 70 page document that discusses new angles for defending mail daemons and more.

tags | paper
SHA-256 | 2f99ebdfed8c9fc33472e8325535722cf2edfec2bccf05e4835912ecc2c62817
WAFUTFF.pdf
Posted Sep 5, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Whitepaper entitled "Writing a fuzzer using the Fuzzled framework". The paper includes some of the techniques used to dismantle protocols including documentation, observation and static analysis.

tags | paper, protocol, fuzzer
SHA-256 | 85eff0372eb6b927c7f66e8380f04f54c2152fb1202fd191238c82796096ff34
newbackdoor-jm.txt
Posted Aug 24, 2007
Authored by MegadetH

Whitepaper entitled "Las nuevas backdoors", discussing new techniques in backdoors and sniffing. Written in Spanish.

tags | paper
SHA-256 | ad3835828509aa5430280f10dce98cbff07e56d28bf314f1479c5d2519d64339
phpendangers.txt
Posted Aug 16, 2007
Authored by Arham Muhammad

Whitepaper entitled PHP Endangers - Remote Code Execution.

tags | paper, remote, php, code execution
SHA-256 | fc600865f3c5af11188782c06005c01ef0a387a4357eb31725436393278cd10f
xss-walkthrough.txt
Posted Aug 15, 2007
Authored by t0pp8uzz, xprog

Whitepaper entitled "XSS The Complete Walkthrough". Written to discuss how web developers should code securely to negate cross site scripting vulnerabilities.

tags | paper, web, vulnerability, xss
SHA-256 | 49155974d24086509ddb711af7801ff27158e8ee699325d11e5b2a93f9a65bb5
tactical_paper.pdf
Posted Aug 10, 2007
Authored by H D Moore, Valsmith | Site metasploit.com

Whitepaper entitled "Tactical Exploitation". This writing discusses a tactical approach to penetration testing that does not rely on exploiting known vulnerabilities. It stems from a talk given at Black Hat 2007 and Defcon 15.

tags | paper, vulnerability
SHA-256 | 63e1873af974293c0c059bd60ed3ba72e9172be14336b903d5d75a8313c75a04
Page 1 of 2
Back12Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close