what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 95 RSS Feed


Password Sniffing In Wireshark
Posted Aug 24, 2010
Authored by rOckHuntEr

Brief whitepaper touching on how to use Wireshark for password sniffing. Written in Arabic.

tags | paper
SHA-256 | 7eacf1df077b891bea39f52dc68658cd50ef625393d0cb2f6198e31cb0b0c56d

Related Files

Everything About The Secure Software Development Process
Posted Jan 9, 2023
Authored by Ismail Tasdelen

This is a brief whitepaper that discusses some basic fundamentals for approaching secure design of an application.

tags | paper
SHA-256 | c962e90a506a04f9658f44421b9bf8e4b0339a1755b66c5c193c109f722ea574
Top Web Application Security
Posted Dec 28, 2021
Authored by Shlok Gupta

Brief whitepaper that discusses well-known standards like OWASP Top 10, OWASP ASVS, WASC and CWE SANS 25.

tags | paper
SHA-256 | bb8c3ba79e4589a5aa83121ea754034f9c5a42dd7b26ad8c48c817a89a9ea285
Securing Authentication And Authorization
Posted Sep 21, 2021
Authored by Jitendra Kumar Singh

This is a brief whitepaper discussing the securing of authentication and authorization.

tags | paper
SHA-256 | ec474e596a9d9ba2ab9781f4af02b1dee9f12e35a15b86af9d6a4566b3045d04
Network Pivoting HackerEnv
Posted Jun 18, 2021
Authored by Hejap Zairy Al-Sharif

Brief whitepaper that goes through proxy, ssh, and vpn pivoting during an attack. Written in Arabic.

tags | paper
SHA-256 | a1e855c508e17641d2eb114eced9cbb69be22f676f04484aaf30c490b078784e
Wordlist Overview
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that discusses wordlists, where to get them, and when to use them.

tags | paper
SHA-256 | 89e78120ceaeb9a64b5808490e77eb00fad19d19fe3106904104df63dfb37a31
HTTP Host Header Attacks
Posted Apr 22, 2021
Authored by SunCSR

This is a brief whitepaper that discuss HTTP Host header attacks.

tags | paper, web
SHA-256 | a6fa96ce1a609cfb613a8375b0180918f63f56cc17ee3a3c76e0de0ea38c3e92
File Transfer Cheatsheet
Posted Mar 8, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that goes over file transfer mechanisms that can be used on Windows and Linux.

tags | paper
systems | linux, windows
SHA-256 | bb53fbaa2dc352533456cf7d06a33392552c749b608b8e33b3b03227d97e1520
Web Application Reconnaissance And Mapping
Posted Mar 5, 2021
Authored by Rishabh Vats

This is a brief whitepaper that goes over some tooling that can be of assistance while performing reconnaissance against a web application prior to attack.

tags | paper, web
SHA-256 | efa89877156455ecbe4998579276a2b7f88564aac2a446ce3a8fdb5d7a98c52c
Mobile App Security
Posted Dec 9, 2020
Authored by SunCSR, Nghia Van Le

This is a brief whitepaper discussing best practices in mobile application security.

tags | paper
SHA-256 | b1918abbd608009a0920e4a9bc031809a5b57b44c3c36e87343ee875c3173748
Buffer Overflow Quick Guide
Posted Jun 8, 2020
Authored by Poseidon-ng

This is a brief whitepaper that discusses buffer overflows and analysis with the Immunity Debugger.

tags | paper, overflow
SHA-256 | 73127a9cc87fc8a939672df63d83e98a8b71f9eac62cd948cf7afa9a24f08ecb
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
SHA-256 | b961ee5f08adf14aeb3683b15f97a4a747d4d428142b2f7ac487d4c97fc8d786
Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
SHA-256 | 188612d0c7a2539a8f339aa1aea144f2e79cae8e31e8f935cf054251a5ed4586
Analysis Using Analytics In Cybersecurity
Posted Aug 8, 2019
Authored by Akash Sarode

This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.

tags | paper
SHA-256 | 18525786505ac237f2a1eb0774841f333bda5911afa3229941ffeb938eea4c77
Man-In-The-Middling TOR
Posted Dec 19, 2017
Authored by Kr1pt0nGirl

This is a brief whitepaper discussing how to perform man-in-the-middle attacks as an exit node on TOR.

tags | paper
SHA-256 | 0f52accc93bc9d4f2ed2e7393a4bc7289bcd92489c25dd669cea0e8b074a2063
Web Application Penetration Testing Techniques
Posted Jun 15, 2017
Authored by Ahmed Al Mutairi

This is a brief whitepaper written in Arabic that gives some examples of tools that can be used to hack systems.

tags | paper
SHA-256 | 2ae93e8c7e8325d75e32afcbb5a09b54616818e152807f8540adb0a73c0988b2
Microsoft Azure Cloud Audit Using Powershell
Posted May 23, 2017
Authored by Parag Kamra

This brief whitepaper discusses using Powershell to audit Microsoft Azure Cloud.

tags | paper
SHA-256 | 21b90899799a56e231053bc320dd4854fc4aaa08824b17602b35091584b50445
Passwords 2015 Call For Papers
Posted Jul 13, 2015
Site passwordscon.org

Passwords 2015 has announced its Call For Papers. It will take place December 7th through the 9th, 2015 at the University of Cambridge, United Kingdom.

tags | paper, conference
SHA-256 | ca17f5045e83a93191564e0ddaa9800deae4ebbe38a38abddbe4598d8a79f7e9
Analysis Of Fake Antivirus Malware Delivery
Posted Feb 24, 2015
Authored by HauntIT

This is a brief whitepaper that documents how the author analyzed malicious javascript and a host used for slinging fake antivirus software.

tags | paper, javascript, virus
SHA-256 | e26853153c11af3c368c496b92cb79cc809c59f6efe56f5c321aefba8a22855c
Open Wi-Fi Hotspots - Threats And Mitigations
Posted Jan 13, 2015
Authored by Renuka Muppavarapu

This is a brief whitepaper that discusses threats and mitigations against those threats when using open wireless access points.

tags | paper
SHA-256 | 0574734d9f9275ddb9dc943efd9df28254d8bcf312ed3e6a17473350b8d1d633
Vulnerability In Popular Plugins
Posted Dec 24, 2014
Authored by HauntIT

This is a brief whitepaper that discusses SQL injection, cross site scripting, and remote shell upload vulnerabilities in various Joomla! plugins.

tags | exploit, remote, shell, vulnerability, xss, sql injection
SHA-256 | 794cddcc554bcd6bb919eccba86c9c7f16316a4cf209458c0e5739cc35e04ba5
PASSWORDS'14 Norway Call For Papers
Posted Sep 15, 2014
Authored by Per Thorsheim

The PASSWORDS'14 Norway Call For Papers has been announced. It will take place December 8th through the 10th, 2014 in Trondheim, Norway.

tags | paper, conference
SHA-256 | a270ae5136e49e09f525068c54f96fe43d036add98f294ae63d3bfe720c708fa
Account Lockouts To Prevent Bruteforcing
Posted Aug 31, 2014
Authored by Abhibandu Kafle

This is a brief whitepaper that provides an analysis of account lockout schemes used to prevent bruteforce attacks.

tags | paper
SHA-256 | 8e18db6be674d94c9a87db4b797085812ec8e170e75ee52055331ec7fa17383e
SQL Injection In Insert, Update, And Delete
Posted May 7, 2014
Authored by Osanda Malith

This is a brief whitepaper that goes over different payloads that can be leveraged in SQL injection attacks.

tags | paper, sql injection
SHA-256 | 9499be52d5cfed9d72ecaf10bc20f2276bb6bc14fd6d1eb70d8afca6916fdf70
PasswordsCon 14 Call For Papers
Posted Mar 3, 2014
Authored by Per Thorsheim

The Passwords^14 Call For Papers has been announced. This year they will be teaming up with BsidesLV and it will be held August 5th and 6th, 2014 in Las Vegas, NV, USA.

tags | paper, conference
SHA-256 | 0e6de150d688bebe16bd35e0c270eef72a5d368e42d96e788440cfd04e133119
Pen Test Tips 2
Posted Jan 3, 2014
Authored by David J. Dodd

This is a brief whitepaper that discusses shell access on both Windows and Unix systems and how to obtain better control versus arbitrary command execution.

tags | paper, arbitrary, shell
systems | windows, unix
SHA-256 | cb59a18f0938580f2565d5dbb95ef2e78886586329dfef334a80e2e3a2b58d8e
Page 1 of 4

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By