Twenty Year Anniversary
Showing 1 - 25 of 3,393 RSS Feed

Whitepaper Files

HITBSecConf2018PEK Call For CTF
Posted Sep 20, 2018
Authored by Hafez Kamal | Site

JD-HITB2018 Beijing CTF plus Finals of the 4th XCTF International League (XCTF Finals 2018) will take place on the 1st and 2nd of November alongside the first-ever HITB Security Conference in Beijing! Participate and stand a chance to win cash prizes worth up to USD 2000.

tags | paper, conference
MD5 | feafb7a6a6dfc34b9699bd3d3b51fe09
Bulk SQL Injection Test On Burp Requests
Posted Sep 19, 2018
Authored by Milad Khoshdel

Whitepaper called Bulk SQL Injection Test on Burp Requests.

tags | paper, sql injection
MD5 | 015a5df23a932e148b23801dae4afc8f
Android Application Penetration Testing
Posted Sep 19, 2018
Authored by Seyedhojjat Hosseini

Whitepaper called Android Application Penetration Testing. Written in Persian.

tags | paper
MD5 | b47a6d74f31e91d13e497f8a4b4dcd46
Sony PlayStation Vita 3.65 / 3.67 / 3.68 h-encore Kernel And User Modifications
Posted Sep 12, 2018
Authored by TheFloW

Whitepaper discussing h-encore kernel and user modifications on the Sony PlayStation Vita versions 3.65, 3.6,7, and 3.68.

tags | paper, kernel
MD5 | 762a4a1d5e95cb2c48917a945bbc5055
XXE Explanation And Exploitation
Posted Sep 12, 2018
Authored by Haboob Team

Whitepaper explaining the consequences of XML eXternal Entity injection and basic to advanced exploitation.

tags | paper
MD5 | cbd4da4e6abe36a624d54fe7edf72aba
Bitter-Harvest: Systemically Fingerprint Low And Medium Interaction Honeypots At Internet Scale
Posted Sep 10, 2018
Authored by Alexander Vetterl, Richard Clayton

Whitepaper called Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.

tags | paper
MD5 | f2578a6913f261534323d76a728a7117
Open Source Intelligence Gathering 201
Posted Sep 10, 2018
Authored by appsecco

Whitepaper called Open Source Intelligence Gathering 201. It covers 12 additional techniques.

tags | paper
MD5 | dd71ed5e76183c0396985e6f775d2d2a
Hypervisor From Scratch - Part 2: Entering VMX Operation
Posted Sep 10, 2018
Authored by Sinaei

This is the second part of a multiple series of a tutorial called "Hypervisor From Scratch". This paper focuses on Entering VMX Operation.

tags | paper
MD5 | e9b7178d774bf75eda15292ace347f55
Out Of Band Exploitation (OOB) CheatSheet
Posted Sep 10, 2018
Authored by NotSoSecure

This whitepaper is an out of band exploitation cheatsheet.

tags | paper
MD5 | f7025ac28c448e3857389f254c2cc20e
Hypervisor From Scratch - Part 1: Basic Concepts And Configure Testing Environment
Posted Sep 10, 2018
Authored by Sinaei

This is the first part of a multi-part series of tutorials called "Hypervisor From Scratch". As the name implies, this course contains technical details to create a basic Virtual Machine based on hardware virtualization. If you follow the course, you will be able to create your own virtual environment and you will get an understanding of how VMWare, VirtualBox, KVM and other virtualization sores use processors' facilities to create a virtual environment.

tags | paper
MD5 | a447980133afcd4e1931f17313c959b5
How We Micropatched A Publicly Dropped 0day In Task Scheduler
Posted Sep 10, 2018
Authored by Mitja Kolsek

Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.

tags | paper
MD5 | 391792ec5cdae832b6dbcc61506e6758
Microsoft .NET Framework CVE-2015-6099 Analysis
Posted Sep 3, 2018
Authored by hyp3rlinx | Site

This whitepaper analyzes a privilege escalation vulnerability in the Microsoft .NET framework as noted in MS15-118.

tags | exploit, paper
advisories | CVE-2015-6099
MD5 | 4a014224fc35bfb528ae5d4ebe710d2d
BSides SF 2019 Call For Papers
Posted Sep 2, 2018

BSides SF is soliciting papers and presentations for the 2019 annual BSidesSF conference. It will be located at City View at the Metreon in downtown San Francisco March 3rd through the 4th, 2019.

tags | paper, conference
MD5 | f4990bdf523a37ddf5520838590b6ff8
Hack In The Box Dubai 2018 Call For Papers
Posted Aug 29, 2018

The call for papers for the upcoming Hack in The Box Security Conference 2018 in Dubai is now open.

tags | paper, conference
MD5 | b6ca9610a67c36eade33819466992d78
UISGCON 14 Call For Papers
Posted Aug 21, 2018

The UISGCON14 Call For Papers has been announced. It will take place on October 26th, 2018 in Kyiv, Ukraine.

tags | paper, conference
MD5 | c244796a12388d7b2f0a7d739489eff9
Machine Learning - Learning Cybersecurity
Posted Aug 10, 2018
Authored by Akash Sarode

Whitepaper called Machine Learning - Learning Cybersecurity.

tags | paper
MD5 | d613a476834fa541683149987754490a
iSecCon 2018 Call For Papers
Posted Jul 24, 2018
Authored by Intel Conference Support | Site

Intel Security Conference (iSecCon) 2018 has announced its call for papers. It will take place in Hillsboro, Oregon, USA from December 4th through the 5th, 2018.

tags | paper, conference
MD5 | 5ce9d4c5c0fbe27b98c20f14709b11e6
File Upload Restrictions Bypass
Posted Jul 23, 2018
Authored by Haboob Team

Whitepaper called File Upload Restrictions Bypass.

tags | paper, file upload
MD5 | 9d615f9f2d0f44874ac4900c33b860ef
Protecting Apps Against Jailbreaking And Rooting
Posted Jul 23, 2018
Authored by Haboob Team

Whitepaper called Protecting Apps Against Jailbreaking And Rooting. Written in Arabic.

tags | paper, root
MD5 | d3a4658f89d1a4cec29023fc05fc7223
AntiVirus Evasion With Metasploit's Web Delivery
Posted Jul 18, 2018
Authored by Dr. Adrian Vollmer

Whitepaper called AntiVirus Evasion with Metasploit's Web Delivery - Leveraging PowerShell to Execute Arbitrary Shellcode.

tags | paper, web, arbitrary, shellcode
MD5 | 68e94c755f9d49405de6fd9c85c19ce2
VLAN Hopping Attack
Posted Jul 18, 2018
Authored by Haboob Team

Whitepaper called VLAN Hopping Attack.

tags | paper
MD5 | 5e2517d456e1c2bcc968d64f8f21223c
Sony Playstation 4 5.05 BPF Double Free
Posted Jul 18, 2018
Authored by Specter, qwertyoruiopz

Sony Playstation 4 version 5.05 BPF double-free kernel exploit whitepaper.

tags | paper, kernel
MD5 | 211837c5b7a80994fc356f4c3f44eb56
Abusing Kerberos: Kerberoasting
Posted Jul 18, 2018
Authored by Haboob Team

Whitepaper called Abusing Kerberos: Kerberoasting.

tags | paper
MD5 | 8c413012e885065de8ecd743e14a240e
Rikki Don't Lose That Bluetooth Device
Posted Jul 11, 2018
Authored by Matthias Deeg, Gerhard Klostermeier

In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don't want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

tags | paper
MD5 | ca29bc7edd73c43f926cb262ce678f74
UAC Bypass And Research With UAC-A-Mola
Posted Jun 28, 2018
Authored by Pablo Gonzalez Perez, Santiago Hernandez Ramos

Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.

tags | paper, bypass
MD5 | 9db859b7c52f75528ae79aa88beb8b30
Page 1 of 136

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    29 Files
  • 20
    Sep 20th
    18 Files
  • 21
    Sep 21st
    5 Files
  • 22
    Sep 22nd
    2 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By