exploit the possibilities
Showing 1 - 25 of 3,533 RSS Feed

Whitepaper Files

OAuth 2.0 Implementation And Security
Posted May 21, 2020
Authored by Haboob Team

Whitepaper called OAuth 2.0 Implementation and Security.

tags | paper
MD5 | a294cb726f90f642c711278a697e63d8
Hunting Red Team Activities With Forensics Artifacts
Posted May 21, 2020
Authored by Haboob Team

Whitepaper called Hunting Red Team Activities with Forensics Artifacts.

tags | paper
MD5 | 052010f0eb75a3b84fd5b85efbeb2cbb
Kerberos: Achieving Command Execution Using Silver Tickets
Posted May 12, 2020
Authored by Haboob Team

Whitepaper called Kerberos: Achieving Command Execution Using Silver Tickets.

tags | paper
MD5 | b6af3918f35480e03b99a605d40c2ec1
Blind CreateRemoteThread Privilege Escalation
Posted May 4, 2020
Authored by petri

Whitepaper called Blind CreateRemoteThread Privilege Escalation.

tags | paper
MD5 | f2ae35b6d0134df40c8af021bb141e40
Bypassing Root Detection Mechanism
Posted May 1, 2020
Authored by Mohammadreza Teymuri

Whitepaper called Bypassing Root Detection Mechanism. Written in Persian.

tags | paper, root
MD5 | e02e9560473dddb6925850b19b152d3b
Exploiting CAN-Bus Using Instrument Cluster Simulator
Posted Apr 15, 2020
Authored by Anjali Prakash

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.

tags | paper
MD5 | ea95d8c2ce4151c44d8dae29b04bfcd2
Azure Cloud Penetration Testing
Posted Apr 10, 2020
Authored by Haboob Team

Whitepaper called Azure Cloud Penetration Testing.

tags | paper
MD5 | 48e67e2b65632432bba8e735f1d5fce5
Centreon 19.10-3.el7 SQL Injection
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.

tags | exploit, paper, remote, vulnerability, sql injection
MD5 | dbac0cf531ae47db48c0dc6c68b92930
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, vulnerability, code execution
MD5 | abc6efe48f42679d3df8d10a4ab60e49
ManageEngine 14 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.

tags | exploit, paper, remote, vulnerability, code execution
MD5 | 361d79554df5c1c70d3bd1a4ab11c9d7
NagiosXI 5.6.11 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.

tags | exploit, paper, remote, vulnerability, proof of concept
MD5 | 73a519ae9906fa675e36f00d2ae34802
Symantec Web Gateway 5.0.2.8 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, proof of concept
MD5 | e3a2193e793902cf582aa14cc8f1a1ee
NagiosXI 5.6 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.

tags | exploit, paper, remote, proof of concept
MD5 | af4fa3179a109a0ef5f00713c259a926
Active Directory DCSync
Posted Apr 6, 2020
Authored by Haboob Team

This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.

tags | paper
MD5 | 360035b1cfe528f9ba2b3eab8d471d54
From Zero Credentials To Full Domain Compromise
Posted Apr 3, 2020
Authored by Haboob Team

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.

tags | paper
MD5 | 1ff5ec3e70d3db856604bdc2d5d41811
Pentesting Zen Load Balancer
Posted Mar 30, 2020
Authored by Cody Sixteen

This whitepaper is a quick tutorial on pentesting the Zen load balancer.

tags | paper
MD5 | 861099cc2be81725b83792a18b56b14b
Hackers 2 Hackers Conference 17th Edition Call For Papers
Posted Mar 25, 2020
Site h2hc.com.br

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.

tags | paper, conference
MD5 | cd42553b9229b45da6f62dde46c6a14c
Solving Computer Forensic Case Using Autopsy
Posted Mar 25, 2020
Authored by Qais Hussainy

Whitepaper called Solving Computer Forensic Case Using Autopsy.

tags | paper
MD5 | 56e506debf00c6b80cba64557df72297
Imperial College COVID-19 Response Team Report
Posted Mar 21, 2020
Authored by Imperial College | Site imperial.ac.uk

The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks.

tags | paper, virus
MD5 | 92166c6ce72fad6671bfdb1d9f798d0a
Manually Exploiting Intel AMT
Posted Mar 18, 2020
Authored by Laxita Jain

This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.

tags | paper, web
advisories | CVE-2017-5689
MD5 | 72fd2e7bef5700602d4113b623fb94b5
REVULN 20x3 Call For Papers
Posted Mar 14, 2020
Authored by REVULN

REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.

tags | paper, conference
MD5 | 0d35b01fac4ff5871350daca4973105d
CarolinaCon Has Been Postponed
Posted Mar 14, 2020
Site carolinacon.org

CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.

tags | paper, conference
MD5 | 9358979fa2b1bad8ed2aeef9467c1b7d
Windows User Accounts Penetration Testing
Posted Mar 9, 2020
Authored by Moslem Haghighian

Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.

tags | paper
systems | windows
MD5 | 24202c63017e503036f420cbfc0ea8a1
Skippipe: Skipping The Watermark In Digital Content
Posted Mar 6, 2020
Authored by Gerard Fuguet

Whitepaper called Skippipe: Skipping the watermark in digital content.

tags | paper
MD5 | 234d1d216375fbefceae0f18c9204b27
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
MD5 | cbf9769b6b0bca565ecb0c138d7549e2
Page 1 of 142
Back12345Next

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    17 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close