Whitepaper discussing the cracking of WPA and WPA-PSK with a wordlist. Written in Spanish.
c270bbe7135098af512abffe5708f49a05055f3714422fb5eb2184f8ab403732
This is a brief whitepaper discussing how to BackTrack 5 and the Social Engineering Toolkit (SET) to generate a malicious java applet in order to gain a reverse shell on Windows 7.
c465ce76e11d434cefe598ce9ad6f6709a3c029e5620d87ca6bb83721ba8d677
This is a whitepaper discussing how to perform very classical text book buffer overflow attacks.
98e30fbc2b7a72173ba7125801d0b0d8e29f954eecc18c97cd0f09b4b5a96465
This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part two.
357450c73effdc1d8d79eadc0c1966d2cf52597ec2b85ef66ef49ae5a9a554f2
This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part one.
0ad627634c11abc77c0211c9fe0d4a8c8b65595f116f610eceb4b969e304e19d
This is a brief whitepaper discussing remote command execution through local file inclusion. Written in Spanish.
5d691f507cf0ddff2324ebc32113aa30516280c5060b723456b2cdaea40c3ed0
This is a brief whitepaper discussing methods of validating a lack of access restriction for various pages on sites. It discusses everything from visual viewing and comparison between cookies used and using an implementation of the Damerau-Levensthein model. They also have a tool for download.
31d9e05acf124177223516cb1f5af275440df270565ba8c268e0a05a6c2aa2ee
This is a brief whitepaper discussing the security of contactless smartcard technology.
74a21b5c3907b319f53c402833c27ad3d326f6ca78d9dff95d4041ee8e139943
This whitepaper discusses using ICMP as a covert tunnel for traffic. An example of this technique is tunneling complete TCP traffic over ping requests and replies. More technically it works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back.
b3f9abf0a20186c20b5029836a0257f08fc519a4a564f7ad5fd760ed03754755
This is a brief whitepaper discussing how to set up QT Mobile Hotspot and YAMAS applications to man in the middle connections using your phone.
8589a3cbc7aa1e43619674b8384fb3846512cc1a76778c508dc5e6c0447074d4
This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone.
343b3862d39127f659978159079fb88e96475725f86982f827ebd28b23cbf412
This is a brief whitepaper discussing how to exploit a webDAV enabled server.
a83e8be5f3033d52a2124e642c22eef3daba9c97b7e1e1ccfcd667ad9b5499e4
This is a short whitepaper discussing how to use Google as a malware spreading tool.
592100b7a17272812aa3c34557d628498f2416d24c8f6c64ec89f6438e05c868
Brief whitepaper discussing how to trick a printer into passing LDAP or SMB credentials back to an attacker in plain text.
4c1967b52b737e8378e0591046c4fbeb02462547b019cb3d9e260b1c5939d804
This whitepaper discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.
88b4ae6ec50477ea59f03c75c24ad0e58dfd2ff3ab41d93aa6d23e371ea194da
This is a brief whitepaper discussing tools and methodologies used by black hat hackers.
99cb5168fe73f25bc8cebea491434ac4136ad39ade7060bd9bca61721ecbea5c
Brief whitepaper discussing security improvements that should be implemented in JBoss application server installations.
9d8bd975a438fe494117107585a9733dd18a0b69956abd53aa48b5f1f79f1711
Whitepaper discussing the anatomy of a null session attack, how it works, and how to prevent it from happening to you. Written in Persian.
0a75c5fb650708bf7ac50efc1d8e0b4ab72bab8961ebc5e8d3490582f9c999ba
Short whitepaper discussing path traversal and bypass methods of exploitation.
11be4413b6236ab6fecdd5a45447e873eb69c85333a414919a70d7f54de08046
Whitepaper discussing how to make a backdoor with return oriented programming and ROPgadget. Written in French.
359f35beea9bb5e9dd45e28409ccda1fe40ca5f1e3ecfdbb92abacf00fc0bf60
Whitepaper discussing cross site scripting, bypassing techniques, and the usefulness of these attacks.
e6db4a2a2b09265739ef2221cc69c49975d5b6ed87df3146923008646935f4fd
This is a whitepaper discussing the risk associated with the privacy of your data on Facebook.
1c7324957e7d7c62de38033fa300af904e3fd13b9fd83df2b808ba22aedd9a41
Brief whitepaper discussing some problems faced when using cloud computing.
53a9ee31b17b5b3f1bb3226bfed1a087dce450306c1cb4d89f1193b47f77a5a5
Whitepaper discussing how to go from having a webshell to getting remote root using the GNU dynamic linker DSO vulnerability on Debian versions 5.0.6 and below and Ubuntu versions 10.04 and below.
ae6f799792df2bc63f6efc669e1ba990189cb2b0e37eae9470cd60171c0c72ba
This is a brief whitepaper discussing how to own Blackboxes (typical broadband routers such as SB5120s, SMC Connect, D-Link dcm-202s, Toshiba PCX2600s, and a handful of RCA and Linksys modems).
3fddebbe2117f3e5ef8cfb311b1cbed6273259f1ba1d32bd24a8c18db80cd5b4
Whitepaper discussing SQL injection. Written in Portuguese.
edaf265484c5491983e11baab3b5fbf2b47295758d381e5f2e0946733f069288