exploit the possibilities
Showing 1 - 25 of 3,480 RSS Feed

Whitepaper Files

CarolinaCon 16 Call For Papers
Posted Dec 4, 2019
Site carolinacon.org

The 16th CarolinaCon will be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020.

tags | paper, conference
MD5 | b37b94d4af6cf9d8b21044e849cec135
BSidesLjubljana 2020 Call For Papers
Posted Nov 27, 2019
Site bsidesljubljana.si

B-Sides Ljubljana will be held April 4th, 2020 in Ljubljana, Slovenia.

tags | paper, conference
MD5 | cc75508f174a9d80d3f5e405effe1cc7
Remote File Inclusion / Local File Inclusion Attack And Defense Techniques
Posted Nov 24, 2019
Authored by Ismail Tasdelen

Whitepaper called Remote File Inclusion / Local File Inclusion Attack and Defense Techniques. This paper focuses on PHP-based attacks.

tags | paper, remote, local, php, file inclusion
MD5 | 34f21e6ac1aa7a3653bb417dc20e8aaf
Injecting .NET Ransomware Into Unmanaged Process
Posted Nov 19, 2019
Authored by Th3 0bservator

Whitepaper called Injecting .NET Ransomware into Unmanaged Process.

tags | paper
MD5 | 3c04c758b7cb9318e8040c19ec7fdbf2
HackBack - A DIY Guide To Rob Banks - Spanish Version
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks. Written in Spanish.

tags | paper
MD5 | 63058fff3240800bd66b55f04226be08
HackBack - A DIY Guide To Rob Banks
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks.

tags | paper
MD5 | 7fe8c92dfe5858a8ece2c480c3216d4b
c0c0n 2020 Call For Papers
Posted Nov 15, 2019
Site is-ra.org

The c0c0n 2020 Middle East call for papers has been announced. It will take place June 15th through the 18th, 2020 at the St. Regis in Abu Dhabi.

tags | paper, conference
MD5 | 35d0438d221ecc7f9f17cd53842e614f
YAML Deserialization Attack In Python
Posted Nov 13, 2019
Authored by Ashish Kukreti, Manmeet Singh

Whitepaper called YAML Deserialization Attack in Python.

tags | paper, python
MD5 | a9bfdb38ec8962eb6bdccd8b7cd59c70
I Own Your Building (Management System)
Posted Nov 12, 2019
Authored by LiquidWorm, Sipke Mellema | Site applied-risk.com

Whitepaper called I Own Your Building (Management System). It discusses various systems used to manage buildings and associated vulnerabilities with them.

tags | paper, vulnerability
MD5 | 8692e82de5e87a163782764b7bbeaff7
Covert Channel And Data Hiding In TCP/IP
Posted Nov 4, 2019
Authored by Roshan Poudel

Whitepaper called Covert Channel and Data Hiding in TCP/IP.

tags | paper, tcp
MD5 | 6fd8666907b5b1aeeb94914778c6b848
RootedCON 2020 Call For Papers
Posted Nov 1, 2019
Site cfp.rootedcon.com

RootedCON is a technology congress that will be held in Madrid (Spain) March 5th through the 7th, 2020. With an estimated seating from 2,000 and 2,500 people, is the most relevant specialized congress that is held in the country, and one of the most relevant in Europe, with attendee profiles ranging from students, Law Enforcement Agencies to professionals in the technology and information security market and, even, just passionate people.

tags | paper, conference
MD5 | 30d8fcbcd0f55d1d8721c199cf36e83c
Hacking The PS2 With Yabasic
Posted Oct 15, 2019
Authored by CTurt

Whitepaper that discusses hacking the Sony Playstation 2 with Yabasic.

tags | paper
MD5 | ef4d562726247dc6be934a633046b1bc
Exploit Wars II - The Server Strikes Back
Posted Oct 7, 2019
Authored by modzero

Whitepaper called Exploits Wars II - The server strikes back.

tags | paper
MD5 | e7773ce3c0c09d5ad85c3ed3e53142ab
Secure Coding To Prevent Some Common Vulnerabilities In Web API .NET
Posted Oct 3, 2019
Authored by Buxu

Whitepaper called Secure coding to prevent some common vulnerabilities (critical/high level) in Web API .NET.

tags | paper, web, vulnerability
MD5 | 90c1d2e9e5066186d95fb8c33dcbc4f0
Practical Decryption exFiltration: Breaking PDF Encryption
Posted Oct 1, 2019
Authored by Christian Mainka, Vladislav Mladenov, Jens Mueller, Jorg Schwenk, Sebastian Schinzel, Fabian Ising

The Portable Document Format, better known as PDF, is one of the most widely used document formats worldwide, and in order to ensure information confidentiality, this file format supports document encryption. In this paper, the authors analyze PDF encryption and show two novel techniques for breaking the confidentiality of encrypted documents.

tags | paper
MD5 | 07a85b3d5850b0d07bc74cd4e5fcc956
Call Your Key To Phone All
Posted Sep 17, 2019
Authored by Gerard Fuguet

This whitepaper discusses acquiring VoIP parameters to take advantage of it and will demonstrate how to extract the password parameter from the provisioning mechanism used by Adamo Telecom Iberia S.A.U.

tags | paper
MD5 | 55d42ea067024fa86e0c68738242b503
Jenkins Groovy Scripts For Red Teamers And Penetration Testers
Posted Sep 10, 2019
Authored by Marco Ortisi, Ahmad Mahfouz

Whitepaper called Jenkins Groovy Scripts for Red Teamers and Penetration Testers.

tags | paper
MD5 | 37a4c513241b8f6c389c5c1cf75a2452
Optimization Method For The Exploitation Times Of Blind SQL Injections
Posted Sep 9, 2019
Authored by Carlos E. Lopez

Whitepaper called Optimization Method For The Exploitation Times of Blind SQL injections.

tags | paper, sql injection
MD5 | 2421682cec87eac02fe702e1cfc969af
Deep Dive Into .NET Malwares
Posted Sep 6, 2019
Authored by Sudeep Singh

This whitepaper provides an in-depth deep dive analysis into .NET malware.

tags | paper
MD5 | 48defef9492f0c5d095d6ecec56c6756
ZeroNights 2019 Call For Papers
Posted Sep 3, 2019
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2019 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia November 12th through the 13th, 2019.

tags | paper, conference
MD5 | f92f44b00e3803c85b3c8c0764b6b5bd
Exploitation Of Windows CVE-2019-0708 (BlueKeep)
Posted Aug 31, 2019
Authored by Palo Alto Networks

Whitepaper called Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into the Kernel with RDP PDU.

tags | paper, kernel
systems | windows
advisories | CVE-2019-0708
MD5 | 6f462839db6bbcac1333d70c6161be2c
Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
MD5 | 5d95461465519fb5f8b887494aae187a
PHP Web Backdoor Decode
Posted Aug 29, 2019
Authored by Mohammad Ariful Islam

Whitepaper called PHP Web Backdoor Decode. It covers decoding an obfuscated/encoded web backdoor shell, recovering the original source code, and the encrypted password in order to login to the backdoor shell.

tags | paper, web, shell, php
MD5 | 6e344c38af456d4c74436df122f2cf9c
BSidesLisbon 2019 Call For Papers
Posted Aug 24, 2019
Site bsideslisbon.org

BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL.

tags | paper, conference
MD5 | 62258dbe561709971ac43d507871e6dd
No cON Name 2019 Call For Papers
Posted Aug 20, 2019
Site noconname.org

The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019.

tags | paper, conference
MD5 | b8bd894366b8d00bf3e8bf213eeecd1e
Page 1 of 140

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    6 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By