exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

Whitepaper Called Image Authentication Injection
Posted Jul 17, 2009
Authored by petros

This is a whitepaper called Image Authentication Injection. Proof of concept code is included.

tags | paper, proof of concept
SHA-256 | d4a68cecd3dae6139f91157e6ef9e79417463b4b054b10498c792b2a524a904e

Related Files

Source Code Analysis With Web Applications II
Posted Jun 19, 2013
Authored by Mehmet Ince

This is a whitepaper discussing source code analysis of web applications. Part II. Written in Turkish.

tags | paper, web
SHA-256 | fe510373b10e5474bdc1acc5c1761320d2fb4d867dc1d9246c37e78241a778a4
Apple iOS Mobile Hotspots - Usability Versus Security
Posted Jun 17, 2013
Authored by Andreas Kurtz, Felix Freiling, Daniel Metz

This is a whitepaper called Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots.

tags | paper
systems | apple, ios
SHA-256 | e3ad95387610b5a1c43bbcf6ce716cc85296bf87179212b9efdbe8af82ff1e4d
Modern Overflow Targets
Posted May 24, 2013
Authored by Eric Wimberley, Nathan Harrison

This is a whitepaper discussing flaws in current stack protection mechanisms and alternate methods of exploiting stack overflows. The paper wastes no time rehashing old methods such as ret2libc or bruteforcing methods against ASLR on forked processes.

tags | paper, overflow
SHA-256 | 4e7ed680646bbcb7250b372e45b6466b0c75f778391612843c163ce4ccd1a39e
Dissecting Blackberry 10 - An Initial Analysis
Posted May 23, 2013
Authored by A. Antukh | Site sec-consult.com

This is a whitepaper titled "Dissecting Blackberry 10 - An Initial Analysis" and discusses the specifics of the Blackberry 10 operating system, fuzzers, dumping the boot sector and other topics.

tags | paper, fuzzer
SHA-256 | 70558b3c822ba1031b30db6cf2441cda58de528f629f8695f4dd323ea389bd4f
WebSockets Penetration Testing
Posted Apr 26, 2013
Authored by Robert Koch

This is a whitepaper called On WebSockets in Penetration Testing. It goes into detail discussing the vulnerability attack surface with WebSockets and the complications involved for penetration testing.

tags | paper
SHA-256 | a8b8492359ecd117e96f3ad36d86915bffba40beab8909428765442c3848ab6b
CUDA Cracking
Posted Apr 3, 2013
Authored by Rohit Shaw

This is a whitepaper that discusses using Compute Unified Device Architecture (CUDA) GPU cracking to crack passwords.

tags | paper
SHA-256 | 73c83fc3029646d3e3bb2f6758ef93e292ef63789d5c4c52472d85962bf1620e
Detecting System Intrusions
Posted Jan 16, 2013
Authored by Almantas Kakareka | Site demyo.com

This is a whitepaper that discusses methods of determining whether or not a system has been compromised based on artifacts left behind.

tags | paper
SHA-256 | a306aabe484995792eac4fe144015a26dafaf4542b41a147cb317f4a93f2cc55
DOMSDAY: Analyzing A DOM-Based XSS In Yahoo!
Posted Jan 15, 2013
Authored by Abysssec, Shahin | Site abysssec.com

This is a whitepaper that discusses a reflective cross site scripting issue in *.adspecs.yahoo.com due to sessvars.js not filtering before performing an eval.

tags | paper, xss
SHA-256 | ec7a8bcfbe030e87367b8b94832c2b64cdd0550ea279469bf63bb2f775015438
Introduction To ARM Linux Exploiting
Posted Jan 9, 2013
Authored by Metin Kaya

This is a whitepaper called Introduction to ARM Linux Exploiting. This version of the paper is the English release.

tags | paper
systems | linux
SHA-256 | 44884c3396952fc4aca39c6fc6d734795eecf9d1c2b2d9bdfb6249c7caae1c1b
Simple Exploitation Of Format String Vulnerabilities
Posted Jan 8, 2013
Authored by Jules Mainsard

This is a whitepaper that explains simple exploitation of format string vulnerabilities. Written in French.

tags | paper, vulnerability
SHA-256 | 37f50131a1fc960ed1176cc771053a11034b9363967b5e831038763416640365
Hashcat Manual de Usuario
Posted Jan 6, 2013
Authored by Mexicanh Team

This is a whitepaper discussing the uses and functionalities of Hashcat. Written in Spanish.

tags | paper
SHA-256 | f1395b782a7ed4b60f17d4baf52e8a0ced37bcdc5c866e51361332e7257b8da3
Post Exploitation With Railgun
Posted Jan 2, 2013
Authored by Arun Mane

This is a whitepaper that discusses how to use Railgun, the extension for Meterpreter Ruby, in order to further exploitation.

tags | paper, ruby
SHA-256 | 128a697ff3970e82db7a11f12271fbff60f21d1c2bdb3216f631fed631acd673
Introduction To ARM Linux Exploiting
Posted Jan 1, 2013
Authored by Metin Kaya

This is a whitepaper called Introduction to ARM Linux Exploiting. Written in Turkish.

tags | paper
systems | linux
SHA-256 | f3481e1afab673f25ffe6c01b43f6b2002a045bfcd6ddd66270467ede06e4b8b
Insecure Authentication Control In J2EE
Posted Dec 28, 2012
Authored by Ashish Rao

This is a whitepaper discussing insecure authentication control in J2EE implemented using sendRedirect().

tags | paper, java
SHA-256 | b2a82a30b0720aba342064d33edf9fea0ba6e7a76c0c2af4a6533a79e5904233
DNS Phishing Paper / Redirector
Posted Dec 22, 2012
Authored by Jules Mainsard

This is a whitepaper called DNS Phishing that also has code for a redirector. Written in French.

tags | paper
SHA-256 | 79f14a332f0ca24b7b35c1b032d15ecc963ba69d1d60fe1df8801c6a152ba2a0
Guidelines For Pen-Testing A Joomla Based Site
Posted Nov 16, 2012
Authored by Shubham Mittal

This is a whitepaper called Guidelines for Pen-testing a Joomla Based Site.

tags | paper
SHA-256 | 7a8cac0307908cecd1cae37fd4ab169ed3f47a3751ee4d0d5a3576aeab6f0cba
Software Exploitation
Posted Nov 16, 2012
Authored by Broja Merino Febrero

This is a whitepaper that details various methods of software exploitation. Written in Spanish.

tags | paper
SHA-256 | fe4fa99489811800fd218dfad01fe65f0599d7ad45672a7a7e3770e7ed7e248d
Dark Comet RAT SQL Injection / Arbitrary File Access
Posted Oct 10, 2012
Authored by Jesse Hertz, Shawn Denbow | Site matasano.com

This is a whitepaper from Matasano that documents multiple zero day vulnerabilities in Dark Comet RAT. These issues include remote SQL injection, man in the middle issues, and arbitrary file access.

tags | exploit, remote, arbitrary, vulnerability, sql injection
SHA-256 | 5fdcf5fad602c3cbdde40ce41d88d40d8290dff47e5bc4bbe9fddeba61cb22a4
XSS Exploitation Via CHEF
Posted Sep 17, 2012
Authored by Evren Yalcin

This is a whitepaper discussing cross site scripting exploitation via CHEF. Written in Turkish.

tags | paper, web, xss
SHA-256 | e98d82370ead61ff8742ed558bf5d4cbd5999da934538163bf431a5c0c562cf5
Taller De Inyecciones LDAP
Posted Sep 14, 2012
Authored by The X-C3LL

This is a whitepaper called Taller De Inyecciones LDAP. It discusses various ways of attacking LDAP. Written in Spanish.

tags | paper
SHA-256 | dec8d85f1a07bc2d711c252c99af4c94eab01dceec060bd79489c9daec976af6
Detecting And Exploiting XSS With Xenotix XSS Exploit Framework
Posted Sep 12, 2012
Authored by Ajin Abraham

This is a whitepaper called Detecting and Exploiting XSS with Xenotix XSS Exploit Framework.

tags | paper, xss
SHA-256 | 59617105598315038569fcdcfa35beec89bf540f72b53763cb4364b163e8cd38
Shellcoding In Linux
Posted Sep 3, 2012
Authored by Ajin Abraham | Site keralacyberforce.in

This is a whitepaper that was written for beginners learning how to write shellcode.

tags | paper, shellcode
SHA-256 | 4408a4e26d5d0e08d0400d47fc4b5fbdc7ea9f4db3d206e9f0a533805edf17ed
Spam And Hackers
Posted Sep 2, 2012
Authored by Dark-Puzzle

This is a whitepaper discussing spam and hackers.

tags | paper
SHA-256 | edb8e62f33060078f8b356e775ce645ac9724f3072cc0ffd701749cf81b23d38
Sage 50 Payroll 2012 Authentication Bypass
Posted Aug 28, 2012
Authored by Richard Davy

This is a whitepaper detailing how to perform authentication bypass against Sage 50 Payroll 2012 version 18.00.031 using Immunity Debugger.

tags | exploit, paper, bypass
SHA-256 | bf9e32ff6711bdd25f0473894bee2ccf852a964b8f3280f156abf18fd8f4ec99
Bypassing Spam Filters Using Homographs
Posted Jul 30, 2012
Authored by Fady Mohamed Osman

This is a whitepaper called Bypassing Spam Filter Using Homographs. Some generation code is also included.

tags | paper
systems | linux
SHA-256 | 53ce87d77ad354d381340e51d46995bbf63257ebb4dd4ce48fd728ce00168df1
Page 3 of 4
Back1234Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close