what you don't know can hurt you
Showing 1 - 25 of 3,583 RSS Feed

Whitepaper Files

Encrypted Linux x86-64 Loadable Kernel Modules (ELKM)
Posted Dec 4, 2020
Authored by cenobyte

Whitepaper called Encrypted Linux x86-64 Loadable Kernel Modules (ELKM). The aim is to protect kernel-based rootkits and implants against observation by EndpointDetection and Response (EDR) software and to neutralize the effects of recovery by disk forensics tooling.

tags | paper, x86, kernel
systems | linux
MD5 | 71edce142a1b2975b9d4d10c1398f3b2
Firmware Analysis And Simulation
Posted Dec 4, 2020
Authored by Prabhankar Tripathi

Whitepaper called Firmware Analysis and Simulation.

tags | paper
MD5 | c1364d9b1fdfd7d6a8410fdcb5a6c864
Digital Signage Systems - The Modern Hacker's Outreach
Posted Dec 3, 2020
Authored by LiquidWorm | Site zeroscience.mk

Whitepaper called Digital Signage Systems - The Modern Hacker's Outreach. It discusses everything from public incidents to common attack vectors leveraged to manipulate content.

tags | paper
MD5 | 5523c83e92054c30532290f6f4a597aa
Weaponize GhostWriting Injection - Code Injection Series Part 5
Posted Nov 28, 2020
Authored by Emeric Nasi

Whitepaper called Weaponize GhostWriting Injection. This is part 5 of a 5 part series of papers.

tags | paper
MD5 | 791ee7b58343b261e98e514c5986c656
Disable Dynamic Code Mitigation (ACG) - Code Injection Series Part 4
Posted Nov 28, 2020
Authored by Emeric Nasi

Whitepaper called Disable Dynamic Code Mitigation (ACG). This is part 4 of a 5 part series of papers.

tags | paper
MD5 | 0e3e2706f39d2d7d4d94ea738b8ad433
Exploit WNF Callback - Code Injection Series Part 3
Posted Nov 28, 2020
Authored by Emeric Nasi

Whitepaper called Exploit WNF Callback. This is part 3 of a 5 part series of papers.

tags | paper
MD5 | de2d2611ba5a65fae0e9b4d906265a18
Bypass Start Address Protection - Code Injection Series Part 2
Posted Nov 28, 2020
Authored by Emeric Nasi

Whitepaper called Bypass Start Address Protection. This is part 2 of a 5 part series of papers.

tags | paper
MD5 | 568ae61a93a997dbd2cec3b699088933
Process PE Injection Basics - Code Injection Series Part 1
Posted Nov 28, 2020
Authored by Emeric Nasi

Whitepaper called Process PE Injection Basics. This is part 1 of a 5 part series of papers.

tags | paper
MD5 | d6c3819eba87765c193f47df3826d9c2
Polymorph 2.0: Advanced Manipulation Of Network Traffic In Real Time
Posted Nov 27, 2020
Authored by Santiago Hernandez Ramos

Whitepaper called Polymorph 2.0: Advanced Manipulation of Network Traffic in Real Time.

tags | paper
MD5 | 5a189432ecf01470a750aa0d2fafb9ed
Artificial Intelligence For Cybersecurity
Posted Nov 27, 2020
Authored by Mohan Santokhi, Jay Santokhi

Whitepaper called Artificial Intelligence for Cybersecurity.

tags | paper
MD5 | 1ca4923f68b9194cacc745cef5a60552
Capturing MSSQL Credentials From An Executable
Posted Nov 26, 2020
Authored by Ismail Onder Kaya

Whitepaper called Capturing MSSQL Credentials from an Executable.

tags | paper, sql injection
MD5 | 9a80044c9c87fbf0c732fe61cadc99ab
A Purple Team Study Into PowerLessShell Tool
Posted Nov 24, 2020
Authored by Haboob Team

Whitepaper called A Purple Team Study Into "PowerLessShell" Tool.

tags | paper
MD5 | 0d3f770f7c45da82e85c26f04679ca64
Code16 Notes Magazine 01
Posted Nov 23, 2020
Authored by Cody Sixteen, code16

Code16 is a compilation of notes from research performed by Cody16. This issue discusses creating web modules for Metasploit and more.

tags | paper, web, magazine
MD5 | 37e9cde49e5ddf663379d345d4abcce3
Code16 Notes Magazine 02
Posted Nov 23, 2020
Authored by Cody Sixteen, code16

Code16 is a compilation of notes from research performed by Cody16. This issue discusses exploring heap overflows and more.

tags | paper, overflow, magazine
MD5 | 69a5018313932a09abe01bb1cf8ab55f
THC Tips, Tricks, And Hacks Cheat Sheet
Posted Nov 19, 2020
Authored by thc | Site thc.org

This paper is a collection of THC's favorite tricks. Many of these tricks are not from them, they merely collect them. They show the tricks as-is without any explanation why they work. You need to know Linux to understand how and why they work.

tags | paper
systems | linux
MD5 | fa4c8dc91c13d2440428ff60d1c22572
NTLM Relaying And LLMNR Poisoning
Posted Nov 17, 2020
Authored by B3KC4T

Whitepaper called NTLM Relaying and LLMNR Poisoning. Written in Turkish.

tags | paper
MD5 | 1053d38b68ece65683d6bf7f89f0d8be
SSL Pinning Bypass
Posted Nov 13, 2020
Authored by Ismail Onder Kaya

Whitepaper that discusses bypassing SSL pinning. Written in Turkish.

tags | paper
MD5 | 847a6587dc05bf63b431eb89e707b61b
No cON Name 2020 Online Edition Call For Papers
Posted Nov 11, 2020
Authored by No cON CFP | Site noconname.org

Call For Papers for the No cON Name 2020 conference. It will be held online December 18th through the 20th, 2020.

tags | paper, conference
MD5 | 84ff61ea16f93dc2660a6921a836048d
Active Directory Attacks - Red It Out
Posted Nov 9, 2020
Authored by Akash Sarode

This paper is focused on the Active directory attacks and various techniques which can be used by an attacker to abuse an AD environment in an enterprise network. This would also mark an introduction to Active directory along with its components. Topics covered include an introduction to Active Directory, Active Directory Structure, Multiple Attack Phases, Domain Persistence Techniques, Golden Ticket Attack, DCSync Attack, Silver Ticket Attack, and DSRM Attack techniques.

tags | paper
MD5 | d00d241885bb6b3d8e30cf19426be800
A Short Tale Of Proxy Leakage
Posted Oct 22, 2020
Authored by David Coomber

A brief write up discussing disclosure of internal IPs and hostnames from Apple bots leveraging Via and X-Forwarded-For headers.

tags | paper
systems | apple
MD5 | 55aef9cbf06435171aad139605e96ea9
Journal Of Cyber Forensics And Advanced Threat Investigations Call For Papers
Posted Oct 12, 2020
Site conceptechint.net

This is the Call for Papers for the International Journal of Cyber Forensics and Advanced Threat Investigations (CFATI). CFATI is the first open access, peer-reviewed, scholarly journal, that is dedicated entirely to the study of tools, techniques, procedures, and methodologies of Red, Yellow, and Blue teamers.

tags | paper, conference
MD5 | 0f204cb88395bc7fdfc1246c52043df7
Packet Reassembly And Overlapping IP Fragments
Posted Oct 7, 2020
Authored by Haboob Team

This paper discusses how intrusion detection systems work. After getting a solid understanding of the working mechanism of IDS, they discuss how packet reassembly works and then moves forward to look into different policy implemented for packet reassembly where it is dependent on the operating system implementation of the RFC.

tags | paper
MD5 | 4560c10a59bfed2734bbd165d32220ff
nullcon Goa 2021 Call For Papers
Posted Oct 1, 2020
Site nullcon.net

The Call For Papers for nullcon Goa 2021 is now open. Nullcon is an information security conference held in Goa, India. The focus of the conference is to showcase the next generation of offensive and defensive security technology. It will take place in March of 2021.

tags | paper, conference
MD5 | 2195e33b7b03998a600766bbee7f995e
Spraying OWA And Abusing MSSQL
Posted Sep 30, 2020
Authored by Haboob Team

Whitepaper that goes over a full attack scenario by getting a foothold through Microsoft Exchange OWA Portal to discover and abuse MSSQL.

tags | paper
MD5 | f741488af943c9146c71ec2735f7f3c3
iOS Swift Anti-Jailbreak Bypass With Frida
Posted Sep 23, 2020
Authored by Raffaele Sabato

Whitepaper called iOS Swift Anti-Jailbreak Bypass with Frida.

tags | paper
systems | ios
MD5 | 3faa4e36a848fdfbb9d0d8405de46e69
Page 1 of 144
Back12345Next

File Archive:

December 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    22 Files
  • 2
    Dec 2nd
    33 Files
  • 3
    Dec 3rd
    16 Files
  • 4
    Dec 4th
    22 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close