exploit the possibilities
Showing 1 - 25 of 3,656 RSS Feed

Whitepaper Files

Penetration Testing Web Storage (User Experience)
Posted Jun 17, 2021
Authored by Abdulrahman Abdullah

Whitepaper called Penetration Testing Web Storage (User Experience). Written in Arabic.

tags | paper, web
MD5 | 4ec008539bf16dd7ff6ee0dfc84348f4
Spoofing Downloaded Filename's Extension In Chromium
Posted Jun 16, 2021
Authored by Vallari Sharma, Archie Midha

This whitepaper illustrates exploitation of an insufficient data validation vulnerability in the Chromium framework.

tags | paper
advisories | CVE-2021-21123
MD5 | 2ed1a0937a1dcc7dbabd4d1dc4a12aa6
Smuggling Via Windows Services Display Name - Lateral Movement
Posted Jun 14, 2021
Authored by Lawrence Amer

This research paper explains how to take advantage of windows services, how to mimic display names to deploy malicious beacons or even Meterpreter sessions.

tags | paper
systems | windows
MD5 | cd92f0d9390e904791e9106139ad7ec7
How To Find WordPress Plugin Vulns
Posted Jun 8, 2021
Authored by WPScan | Site wpscan.com

This e-book gives an overview of how to approach assessing WordPress plugins for vulnerabilities and common vectors of attack.

tags | paper, vulnerability
MD5 | f7a7c7b08d45dc1592fd46877de85318
Cracking pi-hole Passwords
Posted Jun 8, 2021
Authored by Salman Asad

This is a research paper that gives an overview of cracking pi-hole password hashes.

tags | paper
MD5 | 0ac75a99942d6a39dd30baf69553da64
Truth Of Cross Site Scripting
Posted Jun 7, 2021
Authored by Abishekraghav Murugeashan

Whitepaper called Truth of Cross Site Scripting. It gives an overview of types of cross site scripting and how the attacks are achieved.

tags | paper, xss
MD5 | e2a52d31c9bb09c3eb8635ed745660a8
Windows Win32k Elevation Of Privilege Vulnerability
Posted Jun 4, 2021
Authored by Sheikhar Gautam, Rima Yadav

Whitepaper called Windows Win32k Elevation of Privilege Vulnerability. It details exploitation and an overview of CVE-2021-1732.

tags | paper
systems | windows
advisories | CVE-2021-1732
MD5 | 8ee5ffd24aa58abf2f9cb28cf8ce3e44
CMS Made Simple V2.2.13
Posted Jun 4, 2021
Authored by Tanmay Tyagi, Abhinav

Whitepaper giving an overview of a remote code execution vulnerability that exists in CMS Made Simple version 2.2.13.

tags | paper, remote, code execution
advisories | CVE-2020-10682
MD5 | 3af37dab03b3441fb4fb81271f633f50
Heap-Based Overflow Vulnerability In Sudo
Posted Jun 4, 2021
Authored by Akshay Sharma, Yamini Sharma

Whitepaper giving an overview of a heap-based buffer overflow in sudo.

tags | paper, overflow
advisories | CVE-2021-3156
MD5 | aa2fad3b8212022bdbf2ce1569c790b8
XAMPP File Overwrite Vulnerability
Posted Jun 3, 2021
Authored by Ravindu Priyankara

This is a whitepaper that details exploitation of the XAMPP file overwrite vulnerability.

tags | paper
MD5 | c3b9c97412d8a06b113be1ba255de4d6
Ubuntu OverlayFS Local Privilege Escalation
Posted May 31, 2021
Authored by Chris Wild, Sudhanshu Kumar, Rohit Verma

The document in this archive illustrates using the included proof of concept exploit to achieve root on Ubuntu systems using a flaw in the OverlayFS file system. The exploit itself does not have author attribution as the proof of concept came through SSD Disclosures.

tags | exploit, paper, root, proof of concept
systems | linux, ubuntu
advisories | CVE-2021-3493
MD5 | f594195ba35e11d203cb280d4aa0e967
The Game Of Threat Hunting
Posted May 28, 2021
Authored by Akash Sarode

This paper is focused on the various ways in which threat hunting can be performed. It is based on the author's research of semi-automating the entire process by creating a tool based on machine learning and applying analytics.

tags | paper
MD5 | a51877e8a593e357843e3416dee99fcd
ExifTool Djvu Code Execution
Posted May 19, 2021
Authored by Ashutosh Upadhyay

Whitepaper that discusses improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up that allows for arbitrary code execution when parsing a malicious image.

tags | paper, arbitrary, code execution
advisories | CVE-2021-22204
MD5 | 36b4197d887a32ff6217eb61d4554235
CPSIoTSec 2021 Call For Papers
Posted May 14, 2021
Site cpsiotsec.github.io

The Call For Papers has been announced for the 2nd Joint Workshop on CPS and IoT Security and Privacy (CPSIoTSec 2021). It will be held in Seoul, South Korea on November 15, 2021.

tags | paper, conference
MD5 | 624ddab7963341ef5302bda72c963ae7
Pass The Hash - Lateral Movement
Posted May 6, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper discusses Pass The Hash attacks as well as the tooling needed to perform the attacks.

tags | paper
MD5 | 648083f837d1d468db9f436ed86a00d5
Posted May 5, 2021
Authored by SunCSR, Minh Tuan

Whitepaper called Hacking HTTP CORS.

tags | paper, web
MD5 | 9d7985ccaf0286004c923f116d47d946
Root Detection Bypass With frida-push And Objection For iOS And Android
Posted Apr 28, 2021
Authored by Ahmet Recep Saglam

Whitepaper called Root Detection Bypass with frida-push and Objection for iOS and Android. Written in Turkish.

tags | paper, root, bypass
systems | ios
MD5 | cf2857b86392f6fbfb8a1f549f8da9ec
Kerberoasting Guide
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This document covers all the basics of the Kerberoasting attack scenario.

tags | paper
MD5 | 5199b5287830740b414393f88088412c
Comprehensive Guide To FFUF
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This documents discusses using the ffuf tool, which stands for Fuzz Faster U Fool.

tags | paper
MD5 | ec812c323692f9b5a1c3a2e91d9a9044
Comprehensive Guide On TShark
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This document is a guide on how to use tshark effectively to monitor and analyze traffic.

tags | paper
MD5 | b40c4dfc24b53d2c919dd683e5071655
Wordlist Overview
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that discusses wordlists, where to get them, and when to use them.

tags | paper
MD5 | fe2c4f9e82dec7e0f4c8b33e49d5612d
HTTP Host Header Attacks
Posted Apr 22, 2021
Authored by SunCSR

This is a brief whitepaper that discuss HTTP Host header attacks.

tags | paper, web
MD5 | a1981f34582f6b20784bc27231fda231
WordPress Plugins Analysis
Posted Apr 21, 2021
Authored by HitmanAlharbi

This is a whitepaper called WordPress Plugins Analysis.

tags | paper
MD5 | 124c64d93fe129e6a7da5bb4acc816c3
nullcon Goa 2021 Physical Edition Call For Papers
Posted Apr 20, 2021
Site nullcon.net

The Call For Papers for nullcon Goa 2021 Physical Edition is now open. Nullcon is an information security conference held in Goa, India. The focus of the conference is to showcase the next generation of offensive and defensive security technology. It will take place in September of 2021.

tags | paper, conference
MD5 | 21c9208690c391aeb225128f42c161a3
SMASH: Synchronized Many-Sided Rowhammer Attacks From JavaScript
Posted Apr 15, 2021
Authored by Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Pietro Frigo, Emanuele Vannacci, Finn de Ridder

In this paper, the authors show that under realistic assumptions, it is indeed possible to bypass TRR directly from JavaScript, allowing attackers to exploit the resurfaced Rowhammer bug inside the browser. In addition, their analysis reveals new requirements for practical TRR evasion. For instance, they discovered that activating many rows in rapid succession as shown in TRRespass may not always be sufficient to produce bit flips. The scheduling of DRAM accesses also plays an important role.

tags | paper, javascript
MD5 | 836e85101be3fa403bf5501797e73520
Page 1 of 147

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By