exploit the possibilities
Showing 1 - 25 of 3,618 RSS Feed

Whitepaper Files

Web Application Reconnaissance And Mapping
Posted Mar 5, 2021
Authored by Rishabh Vats

This is a brief whitepaper that goes over some tooling that can be of assistance while performing reconnaissance against a web application prior to attack.

tags | paper, web
MD5 | c472e5557b1164f9df6424eef530e4bb
Android Vulnerability In ES File Explorer
Posted Mar 4, 2021
Authored by Tanmay Tyagi

Whitepaper called Android Vulnerability in ES File Explorer. It provides an overview of manual exploitation of ES File Explorer version 4.1.9.7.4 using counterfeit requests over HTTP.

tags | paper, web
advisories | CVE-2019-6447
MD5 | b297ea4788784b7da2249756c339b5e9
Exploiting SMB Ghost
Posted Mar 3, 2021
Authored by Sheikhar Gautam

This whitepaper goes through identification and exploitation of the SMB Ghost vulnerability.

tags | paper
advisories | CVE-2020-0796
MD5 | a2ca40e33c7920f39434262c0b6318d8
Chrome Browser FileReader Use-After-Free
Posted Mar 3, 2021
Authored by Akshay Sharma

This whitepaper goes into detail on how to leverage a Chrome Browser use-after-free vulnerability in FileReader with Metasploit.

tags | paper
advisories | CVE-2019-5786
MD5 | 223b37e61fd45dae8f42b5c2aab41495
Autopsy Tool For Linux And Windows
Posted Feb 27, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper provides an overview of Autopsy, the graphical interface for the Sleuthkit.

tags | paper
MD5 | 98254067e91d1e9b583b157a9d107bd4
Memory Forensics Using Volatility
Posted Feb 26, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a guide to performing memory forensics using volatility. It goes into depth on using the Volatility framework to analyze memory dumped from a live system.

tags | paper
MD5 | a91356160da714ffe1abf4c470cad02e
Active Directory Penetration Testing
Posted Feb 24, 2021
Authored by Hasan Ekin Dumanogullari

Whitepaper called Active Directory Penetration Testing. Written in Turkish.

tags | paper
MD5 | 6cf7cdabf5934f885805bd1b3b9746dc
Mobile Security And Penetration Testing
Posted Feb 23, 2021
Authored by Furkan Enes Polatoglu

Whitepaper called Mobile Security and Penetration Testing. Written in Turkish.

tags | paper
MD5 | 8eb77f9226e892dea4936264dcedaff7
Neo LMS / Matrix LMS Cross Site Scripting
Posted Feb 19, 2021
Authored by Mauro M.

This is a whitepaper that details identifying cross site scripting vulnerabilities in both the Neo and Matrix LMS codebase.

tags | exploit, paper, vulnerability, xss
MD5 | b43cb5c01e20a16db9784dcffb0c586f
Digital Forensics
Posted Feb 16, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is an introductory guide to Digital Forensics. It provides a high level understanding of protocol and roles.

tags | paper, protocol
MD5 | 4e90db017f230cd77eb0cba063d37ab8
Guide To FTK Imager
Posted Feb 15, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a guide to using FTK Imager for digital forensics.

tags | paper
MD5 | e0ed582817040b408c863c6170fd0ee2
Port Forwarding And Tunnelling
Posted Feb 12, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a cheatsheet that goes over various methods of port forwarding and tunnelling of traffic.

tags | paper
MD5 | 2c5dc5ee3665fdf16ae57eab041dab65
Malware Hunting 101
Posted Feb 1, 2021
Authored by SunCSR

Whitepaper called Malware Hunting 101. Written in Vietnamese.

tags | paper
MD5 | b494e839cb504d3ad4f845d155647ba4
Android Application Vulnerabilities
Posted Jan 26, 2021
Authored by SunCSR

Whitepaper called Android Application Vulnerabilities. Written in Vietnamese.

tags | paper, vulnerability
MD5 | 65ca4065964d00a8f0b73e9520869d1c
The Art Of XSS Escalation
Posted Jan 25, 2021
Authored by Mohammed Muteb

Whitepaper called The Art of XSS Escalation. Written in Arabic.

tags | paper
MD5 | bec232064a7047d5845620b18be13b0d
Kong Admin API Overview
Posted Jan 18, 2021
Authored by dash at undisclosed

This whitepaper compiles notes that can be useful to security researchers if access to the administrative API is achieved.

tags | paper
MD5 | 12f9554092c0319f6a27ae52e2d56846
UFW - A Beginners Guide To Linux Firewall
Posted Jan 15, 2021
Authored by Achint Basoya

Whitepaper called UFW - A Beginners Guide to Linux Firewall. The white paper is intended to provide information about a Linux firewall using a simple tool called UFW. It provides complete information on the tool and various ways through which users can create their own firewall rules to protects their assets.

tags | paper
systems | linux
MD5 | 3f0bb94817761f100839d5cdd6f95239
Deep Insight Into Social Engineering
Posted Jan 13, 2021
Authored by Pradyumn Khanchandani, Rushil Saxena

Whitepaper called Deep Insight into Social Engineering.

tags | paper
MD5 | 7ceee78fadaa96ded09aea1718d7ac19
Practical Insight Into Injections
Posted Jan 13, 2021
Authored by Hanut Kumar Arora

Whitepaper called Practical Insight into Injections. This document describes the meaning, working, implementation, and impact of injection vulnerabilities.

tags | paper, vulnerability
MD5 | 03c734fe0bc100e2234162e8efb3ea3b
Blind SSRF With Shellshock Exploitation
Posted Jan 12, 2021
Authored by Hardik Tyagi, Aman Saxena

Whitepaper called Blind SSRF with Shellshock Exploitation. It discusses how an attacker can leverage shellshock to also perform server-side request forgery attacks.

tags | paper
MD5 | 98b9ca178b7a872b9ca5107e78efa8e8
A Hands-On Approach To Linux Privilege Escalation
Posted Jan 12, 2021
Authored by Tanishq Sharma, Shikhar Saxena

Whitepaper called A Hands-On Approach To Linux Privilege Escalation. This document is intended to provide multiple techniques that a pentester can use to escalate their privileges and gain access to higher roles.

tags | paper
systems | linux
MD5 | f6cf10579b31e9f8440e8a43248cd662
Injections 101
Posted Jan 11, 2021
Authored by Hanut Kumar Arora

Whitepaper called Injections 101. It covers everything from SQL injection to XML injection.

tags | paper, sql injection
MD5 | bb362d2c2b41335a6bfbbf0942cf3a98
Wireshark For Noobs
Posted Jan 11, 2021
Authored by Anmol K Sachan

Whitepaper called Wireshark for Noobs.

tags | paper
MD5 | 0f96b685aa1b6798ca17d1c05562352f
Practical PHP Security
Posted Jan 8, 2021
Authored by Andrey Stoykov

Whitepaper called Practical PHP Security.

tags | paper, php
MD5 | ba9dacc8d65da0f08072dc4b5e4512f6
Ethical Hacking And Penetration Testing Guide
Posted Jan 8, 2021
Authored by Furkan Enes Polatoglu

Whitepaper called Ethical Hacking and Penetration Testing Guide. Written in Turkish.

tags | paper
MD5 | ae55abf53fb2c2ab6ef9f6b1cf481640
Page 1 of 145
Back12345Next

File Archive:

March 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    19 Files
  • 2
    Mar 2nd
    15 Files
  • 3
    Mar 3rd
    30 Files
  • 4
    Mar 4th
    13 Files
  • 5
    Mar 5th
    9 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close