Exploit the possiblities
Showing 1 - 25 of 3,315 RSS Feed

Whitepaper Files

Positive Hack Days VIII Call For Papers
Posted Jan 18, 2018
Site phdays.com

Call For Papers for Positive Hack Days VIII which will take place in Moscow, Russia.

tags | paper, conference
MD5 | f33e044f705a866fd08974fa00ad4de1
Using dnscat2 For Encrypted Command/Control Over DNS
Posted Jan 15, 2018
Authored by James Fell

The process of setting up and using dnscat2 is documented in this article. The tool consists of a Ruby server and a small C client, and can be used to quickly establish an encrypted covert channel between two computers over the Internet using DNS traffic. Once set up, the tool is evaluated by exfiltrating data out of a network that has a pfSense firewall at the perimeter blocking direct outbound DNS requests from client machines, and also running the Snort IDS. It is is seen that a reverse shell is successfully sent out of the network and no IDS alerts are generated.

tags | paper, shell, ruby
MD5 | 546258ea9351502c0d3aaad5bf6cfb05
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
Posted Jan 12, 2018
Authored by rootkit

Whitepaper called Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference.

tags | paper, kernel
systems | windows
MD5 | 6d619680559450b20c39f2d197102acb
beVX Offensive Security Conference 2018 Call For Papers
Posted Jan 11, 2018
Authored by beVX CFP | Site bevxcon.com

beVX! has announced its call for papers. It will take place September 20th through the 21st, 2018 in Hong Kong.

tags | paper, conference
MD5 | 891375a86909b53e740bc3b900dd165c
Nuit Du Hack 2018 Call For Papers
Posted Jan 11, 2018
Authored by Nuit Du Hack

The Nuit Du Hack Call For Papers for 2018 has been announced. It will be held June 30th through July 1st, 2018 in Paris, France.

tags | paper, conference
MD5 | abf486203206ee255c6ac44197e54c7a
Poking A Hole In Whitelist For Bypassing Firewall
Posted Jan 10, 2018
Authored by Rafay Baloch

Whitepaper called Poking a Hold in Whitelist for Bypassing Firewall.

tags | paper
MD5 | afaa4636829b4f86201d74a5374ad471
Meltdown - Bypassing Intel's Hardware Barrier
Posted Jan 4, 2018
Authored by Yuval Yarom, Michael Schwarz, Mike Hamburg, Moritz Lipp, Paul Kocher, Werner Haas, Thomas Prescher, Stefan Mangard, Daniel Gruss, Daniel Genkin

Whitepaper called Meltdown. It discusses how you can bypass Intel's hardware barrier between applications and the computer's core memory.

tags | paper
MD5 | 7e062aa9d394c19c6c994fa36a6196e6
Spectre Attacks: Exploiting Speculative Execution
Posted Jan 4, 2018
Authored by Yuval Yarom, Michael Schwarz, Mike Hamburg, Moritz Lipp, Paul Kocher, Werner Haas, Thomas Prescher, Stefan Mangard, Daniel Gruss, Daniel Genkin

Whitepaper called Spectre Attacks: Exploiting Speculative Execution. It discusses how to trick error-free applications into giving up secret information.

tags | paper
advisories | CVE-2017-5715, CVE-2017-5753
MD5 | 6967810094670a0978da20db86fbfadc
Reading Privileged Memory With A Side-Channel
Posted Jan 4, 2018
Authored by Jann Horn, Google Security Research | Site googleprojectzero.blogspot.co.uk

This is the very thorough blog write-up discussing three variants of side-channel attacks that can be leveraged against CPU data cache timing.

tags | paper
advisories | CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
MD5 | 2363cefeef0652a5bd4abcd5e6ee4559
FAQin Congress 3 Call For Proposals
Posted Jan 2, 2018
Site faqin.org

FAQin Congress is a free invitation-only underground hacking event in Madrid, Spain being held March 1st through the 3rd, 2018. The call for proposals has been announced.

tags | paper, conference
MD5 | 4b69d1c8434684041dacc16086ac4a99
BSidesLjubljana 2018 Call For Papers
Posted Dec 19, 2017
Site bsidesljubljana.si

B-Sides Ljubljana will be held March 10th, 2018 in Ljubljana, Slovenia.

tags | paper, conference
MD5 | 38284c5e10a12c97ee4941aa672bb23c
Man-In-The-Middling TOR
Posted Dec 19, 2017
Authored by Kr1pt0nGirl

This is a brief whitepaper discussing how to perform man-in-the-middle attacks as an exit node on TOR.

tags | paper
MD5 | 0397952789142ad6428f23b95f03f8c2
BSides SF 2018 Call For Papers
Posted Dec 5, 2017
Site bsidessf.org

BSides SF is soliciting papers and presentations for the 2018 annual BSidesSF conference. It will be located at City View at the Metreon in downtown San Francisco April 15th through the 16th, 2018.

tags | paper, conference
MD5 | 8e4bb752ebfe8549d15d25391de519f6
NorthSec 2018 Call For Papers
Posted Dec 1, 2017
Site nsec.io

NorthSec 2018 has announced its Call For Papers. It will be held in Montreal, Canada, from May 14th through the 20th, 2018.

tags | paper, conference
MD5 | 527a3ac3e9b1eb677d2d89b3f9fb085c
Bypassing Browser Security Policies For Fun And Profit
Posted Nov 6, 2017
Authored by Rafay Baloch

In this paper, the authors present their research about bypassing core security policies implemented inside browsers such as the "Same Origin Policy". They present several bypasses that were found in various mobile browsers. In addition, they also uncover other interesting security flaws found during their research such as Address Bar Spoofing, Content Spoofing, Cross Origin CSS Attacks, Charset Inheritance, CSP Bypass, Mixed Content Bypass etc. as found in Android Browsers. This is from a talk given at BlackHat ASIA 2016.

tags | paper, spoof
MD5 | ae67f5ff17aa89a494c33e64468b75e0
WorldCIST 18 Call For Papers
Posted Nov 6, 2017
Site worldcist.org

The Information Systems and Technologies research and industrial community is invited to submit proposals of Workshops for WorldCist'18. It will be held in Naples, Italy March 27th through the 29th, 2018.

tags | paper, conference
MD5 | 2218e42d14a7e7428348484f3cf2bfb6
Hacksys Extreme Vulnerable Windows Driver Analysis Part 1
Posted Oct 19, 2017
Authored by Alireza Chegini

Whitepaper called Hacksys Extreme Vulnerable Windows Driver Analysis. Part 1 of a series. Written in Arabic.

tags | paper
systems | windows
MD5 | c6aaef0e16af84719f2f55fdbf70e8db
Key Reinstallation: Forcing Nonce Reuse In WPA2
Posted Oct 16, 2017
Authored by Frank Piessens, Mathy Vanhoef | Site krackattacks.com

Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected.

tags | paper, crypto, protocol
advisories | CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088
MD5 | 9ae08a7eee791f7977ada5c05ba50f29
nullcon Goa 2018 Call For Papers
Posted Oct 4, 2017
Site nullcon.net

The Call For Papers for nullcon Goa 2018 is now open. It's the time of the year when they welcome research done by the community as paper submissions for nullcon. So, sip your coffee, dust your debuggers, fire your tools, challenge your grey cells and shoot them an email. It will take place March 2nd through the 3rd, 2018 in Goa, India.

tags | paper, conference
MD5 | 03cceca06a854253d0f37ba9b89ab7b9
RECON Brussels 2018 Call For Papers
Posted Sep 19, 2017
Authored by RECON Brussels 2018 | Site recon.cx

RECON Brussels has announced it's call for papers. The conference will take place January 29th through February 4th, 2018 in Brussels, Belgium.

tags | paper, conference
MD5 | b8cd79d146f9f4323ceb0141217dd86c
Code Injection - HTML Injection
Posted Sep 4, 2017
Authored by Shritam Bhowmick

Whitepaper that discussions both code and html injection attacks.

tags | paper
MD5 | 8a32755f82e4b581a5491e4fbe4cb3af
Offensive And Defensive PowerShell
Posted Aug 28, 2017
Authored by Halil Dalabasmaz

Whitepaper called Offensive and Defensive PowerShell. Written in Turkish.

tags | paper
MD5 | 7be9cc28ce3b4845f5306c8fc586420d
Hidden Network: Detecting Hidden Networks Created With USB Devices
Posted Jul 13, 2017
Authored by Francisco Jose Ramirez Vicente, Pablo Gonzalez Perez

Whitepaper called Hidden Network: Detecting Hidden Networks created with USB Devices.

tags | paper
MD5 | 40432b7a852ac9dc2303afdfbd464da4
Ekoparty 2017 Call For Papers
Posted Jul 13, 2017
Site cfp.ekoparty.org

The thirteenth edition of the Ekoparty Security Conference has announced its Call For Papers. It will take place September 25th through the 29th, 2017 in Buenos Aires, Argentina.

tags | paper, conference
MD5 | 55d93f440a8cfc3c01ca106ac90cdbe4
ToorCon 19 Call For Papers
Posted Jul 10, 2017
Site sandiego.toorcon.net

ToorCon 19 has announced its call for papers. This conference will take place September 1st through the 3rd, 2017 in San Diego, CA, USA.

tags | paper, conference
MD5 | ab72109010be30c6fdbfb50303e718ba
Page 1 of 133
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    7 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close