what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 59 RSS Feed

Files

format-string-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Format String Exploitation Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 915519f063cd8236fa2caaa14c2c8889ec51bdd79b0d0f3cd8fe31c44d60ccd5

Related Files

Format Factory 4.1.0 DLL Hijacking
Posted Aug 4, 2017
Authored by Kyaw Thiha

Format Factory version 4.1.0 suffers from a dll hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | 2d1800a0e90ff56cad942b1f9a13414fe92b2d764e031062a609c34df017a09d
HackBack - A DIY Guide For Those Without The Patience To Wait For Whistleblowers
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.

tags | paper
SHA-256 | 8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
HackBack - A DIY Guide, Spanish Version
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.

tags | paper
SHA-256 | cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
HackBack - A DIY Guide
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide.

tags | paper
SHA-256 | 13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
Format String Exploitation Tutorial
Posted Sep 23, 2013
Authored by Saif El-Sherei

This is a brief whitepaper tutorial that discusses format string exploitation.

tags | paper
SHA-256 | 1544465d9c53bc46b45f199277e5af8bfc93c0c6d2f40f5ff2478c2db9d3714b
PE (Portable Executable) File Format
Posted Aug 12, 2013
Authored by Nytro

This paper describes the PE (Portable Executable) file format used by Windows executables (.exe), dynamic link libraries (.dll) and other files: system drivers or ActiveX controls. It is written in Romanian.

tags | paper, activex
systems | windows
SHA-256 | a2646c777b4db6e736b6d280dbe7880941e981053a622f50cc9a96c813f0425e
FormatFactory 3.0.1 Buffer Overflow
Posted Nov 20, 2012
Authored by Julien Ahrens

FormatFactory versions 3.0.1 and below suffer from a profile file handling buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 0c29efe3ead46ec1b8b8b18717562e87540d38612b3cbe97b146a01d6a7a66c6
Format String Exploitation On Windows
Posted Feb 10, 2009
Authored by Abysssec | Site abysssec.com

Whitepaper called Format String Exploitation On Windows Using Immunity Debugger / Python.

tags | paper, python
systems | windows
SHA-256 | f7598f438ab72ca2c8b0322f31972b57a2033437683d39ad40db27bd7d64f7f3
Whitepaper - Short Review Of Modern Vulnerability Research
Posted Jan 12, 2009
Authored by Michal Bucko | Site eleytt.com

Whitepaper entitled Short Review Of Modern Vulnerability Research.

tags | paper
SHA-256 | 50f3d7b703ae7599064134dd9771cdf630e1cfeb90294a067782e794b36e361e
fsharp-reverse.pdf
Posted Dec 3, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Reverse Engineering Microsoft F#.

tags | paper
SHA-256 | 4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
frame-pointer-overwrite-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Frame Pointer Overwrite Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 48ec50a815d6f4578f50c4fe6f040b3db9d46a1b0033540beaac9b8253b52617
java2-malware.pdf
Posted Nov 20, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.

tags | paper, java
SHA-256 | 33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
exploration.pdf
Posted Nov 12, 2008
Authored by Xylitol | Site xylitol.free.fr

Whitepaper entitled Exploration In The Cross Territory, a follow up paper to the Cross Site Scripting - Attack and Defense Guide.

tags | paper, xss
SHA-256 | 22261dd7d0353e4a08f864b8638db726e06e08be483dedd672758a6b6ec89362
domain-traversal.pdf
Posted Nov 9, 2008
Authored by hkm

Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.

tags | paper, file inclusion
SHA-256 | d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
file_sharing_security.pdf
Posted Nov 8, 2008
Authored by Francis Corella | Site pomcor.com

Whitepaper entitled Protecting A Web Application Against Attacks Through HTML Shared Files.

tags | paper, web
SHA-256 | a332ffa53a93ffea3c43a63213809c1bc705467514a6098021161dd8468c04fb
banking-flaws.pdf
Posted Nov 4, 2008
Authored by webDEViL

Whitepaper entitled Internet Banking Flaws In India.

tags | paper
SHA-256 | 5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
appOSfingerprint.txt
Posted Oct 30, 2008
Authored by Dan Crowley

Whitepaper entitled Advanced application-level OS fingerprinting: Practical approaches and examples.

tags | paper
SHA-256 | e7bbfb46c5d92567d485f28a4014af6d68fc50ef1c5709b2306ba11e36be0d3d
SNMP_injection.pdf
Posted Oct 22, 2008
Authored by Adrian Pastor | Site procheckup.com

Whitepaper entitled SNMP Injection - Achieving Persistent HTML Injection via SNMP on Embedded Devices.

tags | paper
SHA-256 | ace95e6e015bcde9714bec5eb0612843f605b3cd71d3b207aaadcab78367c8ad
2008-esorics.pdf
Posted Oct 22, 2008
Authored by flaviog, petervr, ronny, bart, gkoningg, rmuijrer, rverdult

Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.

tags | paper
SHA-256 | 1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
fuzzing-auatfb.pdf
Posted Oct 21, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Fuzzing: A Useful Approach to Finding Bugs.

tags | paper
SHA-256 | 9c907cb0d0124b9ee8e6d11b1d8c18b22f0c23181a1bd6ffb8ffffe1f6c43c74
Detecting_and_Exploiting_ActiveX_Controls.pdf
Posted Oct 20, 2008
Authored by Shahriyar Jalayeri

Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.

tags | paper, vulnerability, activex
SHA-256 | a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
xenfb-adventures-10.pdf
Posted Oct 16, 2008
Authored by Rafal Wojtczuk

Whitepaper entitled Adventures with a certain Xen vulnerability (in the PVFB backend).

tags | paper
advisories | CVE-2008-1943
SHA-256 | dc2c1f613ed2294698e11fed5a558cda1fc7acdf157f9e6e5393eec8a6b2f4d5
Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site irmplc.com

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
SHA-256 | 010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e
secure_smtp_proxy_for_protecting_mta.tar.gz
Posted Sep 6, 2007
Authored by Alin-Adrian Anton

Whitepaper entitled "Secure SMTP Proxy for Protecting Mail Transfer Agents". This is a 70 page document that discusses new angles for defending mail daemons and more.

tags | paper
SHA-256 | 2f99ebdfed8c9fc33472e8325535722cf2edfec2bccf05e4835912ecc2c62817
WAFUTFF.pdf
Posted Sep 5, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Whitepaper entitled "Writing a fuzzer using the Fuzzled framework". The paper includes some of the techniques used to dismantle protocols including documentation, observation and static analysis.

tags | paper, protocol, fuzzer
SHA-256 | 85eff0372eb6b927c7f66e8380f04f54c2152fb1202fd191238c82796096ff34
Page 1 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close