what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed


Whitepaper Called Image Authentication Injection
Posted Jul 17, 2009
Authored by petros

This is a whitepaper called Image Authentication Injection. Proof of concept code is included.

tags | paper, proof of concept
SHA-256 | d4a68cecd3dae6139f91157e6ef9e79417463b4b054b10498c792b2a524a904e

Related Files

Web Services Penetration Testing
Posted Apr 17, 2017
Authored by Firat Celal Erdik, Mert Tasci

This is a whitepaper that discussing penetration testing against web services. Written in Turkish.

tags | paper, web
SHA-256 | 4883e0979bed91e02253acc95f59113aa6d85ba94b5cdfa5e26ea275754dd7e0
Analysis Of The Ivyl Sample Kernel Rootkit
Posted Feb 21, 2017
Authored by x90c

This is a whitepaper providing an analysis of the Ivyl sample kernel rootkit. Written in Korean.

tags | paper, kernel
SHA-256 | 71d40dd68c22a31b2cfc4dfd31815074bf58fa1edd58aba7f08a8f9a42c0f637
Injecting SQLite Database-Based Application
Posted Feb 19, 2017
Authored by Manish Tanwar

This is a whitepaper that discusses leveraging SQL injection attacks against SQLite databases.

tags | paper, sql injection
SHA-256 | 2d25bf7c68c93856be515e7d7f9ce1c5e31d0ff0e1c4c03ba1d67a61f385507e
Cloud Forensics
Posted Jan 14, 2017
Authored by Preet Shah

This is a whitepaper that covers basic cloud computer concepts, forensics, and challenges surrounding investigations.

tags | paper
SHA-256 | 1f6e07bac5a07052fa1000a691dd7c60403ae3e4ee15187f5bcb0eca16b6c96c
Web Security Vulnerabilities
Posted Oct 17, 2016
Authored by Mehmet Kelepc

This is a whitepaper discussing web security vulnerabilities. Written in Turkish.

tags | paper, web, vulnerability
SHA-256 | b2ce8a86af38939099135b17282b82b0cb706186a89434a63685fd266848f998
Important Tips For Using Wireshark
Posted Oct 3, 2016
Authored by Meryem AKDOGAN

This is a whitepaper discussing important tips for using Wireshark. Written in Turkish.

tags | paper
SHA-256 | 478cd56d7f569b7f38474c8b63d3d81560b46e5f0a9e14ab6cf7565202e14f76
Protecting IIS With Apache Mod Proxy And Dotdefender WAF
Posted Mar 17, 2015
Authored by Akastep

This is a whitepaper discussing using Apache with mod_proxy and Dotdefender to protect IIS installs. Written in Azerbaijani.

tags | paper
SHA-256 | d05d7429ea70363cecca14474d2edcf047db67733e981e02c510f7d4967caf65
How To Secure Against Glibc Ghost Vulnerability
Posted Jan 30, 2015
Authored by Rajivarnan.R

This is a whitepaper discussing mitigation of the Ghost glibc vulnerability as discussed in CVE-2015-0235.

tags | paper
advisories | CVE-2015-0235
SHA-256 | 77fdf5e2024f2bd5d09207c0e6a1b4251255bb6447af8bde63b893affd58ba12
Nmap Port Scanning: A Practical Approach Modified For Better
Posted Dec 4, 2014
Authored by Florian MINDZSEC

This is a whitepaper that goes into detail on the functionality and usage of nmap for portscanning.

tags | paper
SHA-256 | cffff0e67f22659f5d7c00d6e26d36df6b0e18bf9774586955949bbb52a0ced4
Exploitation Of Hash Functions
Posted Aug 26, 2014
Authored by Deepanshu Khanna

This is a whitepaper that touches on various cryptography and discusses hash functions at a slightly greater length.

tags | paper
SHA-256 | 5aa0be1d76aebe75b38c23e223c667b62f5b40c08d40af7df228f6c99c7dfcbf
Hacking ASP/ASPX Websites Manually
Posted Jun 30, 2014
Authored by Chetan Soni

This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually.

tags | paper, asp
SHA-256 | e01e929f0159f35636b57ccb14d23133cee0871e331625923ed2e065e0033b49
TP-Link TD-W89 Exploitation
Posted May 16, 2014
Authored by t3h n00b

This is a whitepaper that goes into detail on downloading configuration files and exploiting the TP-Link TD-W89.

tags | paper
SHA-256 | 2dfc73d9ef994b03b446f888c6817b5c32e2be979c223712e3c435c81878b3b7
Uploading PHP Shell Through SQL Injection
Posted Mar 20, 2014
Authored by 6_Bl4ck9_f0x6

This is a whitepaper that goes into detail on how a PHP shell can be uploaded when leveraging SQL injection.

tags | paper, shell, php, sql injection
SHA-256 | 4bd1b56e632e868443ab5b6f7e07a054ee3c7586c9391af4c31b235f0d5348db
The Art Of Stealth Scanning
Posted Mar 11, 2014
Authored by Fardin Allahverdinazhand

This is a whitepaper called the Art of Stealth Scanning. It is written in Persian.

tags | paper
SHA-256 | bc4a0ec403dff01e2ba4a5b455bfb43b48b9c57a6ae42ade92c9474ff2c27968
Clamwin Antivirus Bypass Methodology
Posted Feb 17, 2014
Authored by Freebyte

This is a whitepaper discussing the bypassing of Clamwin Antivirus. Written in Azerbaijan.

tags | paper, bypass
SHA-256 | 98bc6e18cd7a7451a7a16c334edae8e56514a14d1cb46d89f1f663f542990e1d
Discovery Of RPC Vulnerabilities
Posted Feb 6, 2014
Authored by Celil Unuver

This is a whitepaper discussing the discovery of RPC vulnerabilities. Written in Turkish.

tags | paper, vulnerability
SHA-256 | 513fdf6e6be7dba449a50a572bb38d5581417c51cdf7bbfefd1d2f33568e1df0
Posted Jan 20, 2014
Authored by F4RY4R_RED

This is a whitepaper discussing the use of cookies. Written in Persian.

tags | paper
SHA-256 | 876b721cfce59078081bee0f96df5067acad3fcdadc2c66fc1e1dee1cb2e1735
Heap Spraying - Active-X Controls Under Atatck
Posted Jan 17, 2014
Authored by Ashfaq Ansari

This is a whitepaper that discusses using heap sprays with vulnerable active-x controls.

tags | paper, activex
SHA-256 | 182912d0e8bbbc850abf4281ee8356d5767b5cb9c7194c7bbfc2b5eab415ddae
Fuzzing And Software Vulnerabilities Part 1
Posted Oct 24, 2013
Authored by Ibrahim Balic

This is a whitepaper discussing fuzzing and software vulnerabilities. This is part one. It is written in Turkish.

tags | paper, vulnerability
SHA-256 | 29c607fe9abef0fbc5dd236320bcc02b3b1b6084b7be47b5e412136cdbb1b06f
Metasploit - The Exploit Learning Tree
Posted Aug 29, 2013
Authored by Mohan Santokhi

This is a whitepaper called Metasploit - The Exploit Learning Tree. Instead of being just another document discussing how to use Metasploit, the purpose of this document is to show you how to look deeper into the code and try to decipher how the various classes and modules hang together to produce the various functions.

tags | paper
SHA-256 | 8053bf6927fee92962392df083a57d2a8ab44f95c200a4b5ef0d6c585cbd073d
Taint Analysis And Pattern Matching With Pin
Posted Aug 9, 2013
Authored by Jonathan Salwan

This is a whitepaper called Taint analysis and pattern matching with Pin. All examples in this document are considered a proof of concept and are meant to give others ideas.

tags | paper, proof of concept
SHA-256 | ec76a2f8def58b42c1d7b3105a4bea93f29bbf23d2776a4316a9981f1cb84489
JDWP Exploitation
Posted Jul 24, 2013
Authored by prdelka

This is a whitepaper discussing arbitrary java code execution leveraging the Java Debugging Wire Protocol (JDWP).

tags | exploit, java, arbitrary, code execution, protocol
SHA-256 | 0adc9316e503d0fe3daa7da5e64d578c4f345eb5aeee58462a82afd7494b1a6d
Simple Weevely Guide
Posted Jul 2, 2013
Authored by n4sss

This is a whitepaper called Simple Weevely Guide. It is written in Portuguese.

tags | paper
SHA-256 | 8c2b5a41f39788d44fc3d28422da6b1e9b25562ea89d908c4cd70a1e3ba22f5d
Digital Satellite Receiver And Safety
Posted Jun 27, 2013
Authored by Tacettin Karadeniz

This is a whitepaper called Digital Satellite Receiver and Safety. Written in Turkish.

tags | paper
SHA-256 | d7cc66e8f99debfec1f75708fbfa4198805f1c26fc1e85a0a541cd7c1cd2a814
SMB Hijacking
Posted Jun 20, 2013
Authored by Ares

This is a whitepaper called SMB Hijacking. Kerberos is defeated.

tags | paper
SHA-256 | e4ebb0e6abe8e3336a32bbc733610105b1aadafc45ddc1ff3cd056d26d6b0904
Page 2 of 4

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By