Whitepaper entitled Format String Exploitation Demonstration [LINUX].
915519f063cd8236fa2caaa14c2c8889ec51bdd79b0d0f3cd8fe31c44d60ccd5
Format Factory version 4.1.0 suffers from a dll hijacking vulnerability.
2d1800a0e90ff56cad942b1f9a13414fe92b2d764e031062a609c34df017a09d
Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.
8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.
cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
Whitepaper entitled HackBack - A DIY Guide.
13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
This is a brief whitepaper tutorial that discusses format string exploitation.
1544465d9c53bc46b45f199277e5af8bfc93c0c6d2f40f5ff2478c2db9d3714b
This paper describes the PE (Portable Executable) file format used by Windows executables (.exe), dynamic link libraries (.dll) and other files: system drivers or ActiveX controls. It is written in Romanian.
a2646c777b4db6e736b6d280dbe7880941e981053a622f50cc9a96c813f0425e
FormatFactory versions 3.0.1 and below suffer from a profile file handling buffer overflow vulnerability.
0c29efe3ead46ec1b8b8b18717562e87540d38612b3cbe97b146a01d6a7a66c6
Whitepaper called Format String Exploitation On Windows Using Immunity Debugger / Python.
f7598f438ab72ca2c8b0322f31972b57a2033437683d39ad40db27bd7d64f7f3
Whitepaper entitled Short Review Of Modern Vulnerability Research.
50f3d7b703ae7599064134dd9771cdf630e1cfeb90294a067782e794b36e361e
Whitepaper entitled Reverse Engineering Microsoft F#.
4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
Whitepaper entitled Frame Pointer Overwrite Demonstration [LINUX].
48ec50a815d6f4578f50c4fe6f040b3db9d46a1b0033540beaac9b8253b52617
Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.
33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
Whitepaper entitled Exploration In The Cross Territory, a follow up paper to the Cross Site Scripting - Attack and Defense Guide.
22261dd7d0353e4a08f864b8638db726e06e08be483dedd672758a6b6ec89362
Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.
d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
Whitepaper entitled Protecting A Web Application Against Attacks Through HTML Shared Files.
a332ffa53a93ffea3c43a63213809c1bc705467514a6098021161dd8468c04fb
Whitepaper entitled Internet Banking Flaws In India.
5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
Whitepaper entitled Advanced application-level OS fingerprinting: Practical approaches and examples.
e7bbfb46c5d92567d485f28a4014af6d68fc50ef1c5709b2306ba11e36be0d3d
Whitepaper entitled SNMP Injection - Achieving Persistent HTML Injection via SNMP on Embedded Devices.
ace95e6e015bcde9714bec5eb0612843f605b3cd71d3b207aaadcab78367c8ad
Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.
1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
Whitepaper entitled Fuzzing: A Useful Approach to Finding Bugs.
9c907cb0d0124b9ee8e6d11b1d8c18b22f0c23181a1bd6ffb8ffffe1f6c43c74
Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.
a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
Whitepaper entitled Adventures with a certain Xen vulnerability (in the PVFB backend).
dc2c1f613ed2294698e11fed5a558cda1fc7acdf157f9e6e5393eec8a6b2f4d5
Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.
010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e
Whitepaper entitled "Secure SMTP Proxy for Protecting Mail Transfer Agents". This is a 70 page document that discusses new angles for defending mail daemons and more.
2f99ebdfed8c9fc33472e8325535722cf2edfec2bccf05e4835912ecc2c62817
Whitepaper entitled "Writing a fuzzer using the Fuzzled framework". The paper includes some of the techniques used to dismantle protocols including documentation, observation and static analysis.
85eff0372eb6b927c7f66e8380f04f54c2152fb1202fd191238c82796096ff34