what you don't know can hurt you
Showing 1 - 25 of 3,450 RSS Feed

Whitepaper Files

Bypassing Web Application Firewalls With HTTP Parameter Pollution
Posted Jul 10, 2019
Authored by Berk Sagiroglu

Whitepaper called Bypassing Web Application Firewalls with HTTP Parameter Pollution. Written in Turkish.

tags | paper, web
MD5 | 5e515a4b949177e71c30bead05663400
Apache Camel Exploitation
Posted Jul 4, 2019
Authored by Nick Aliferopoulos

Whitepaper called Apache Camel Exploitation. It discusses how unvalidated input in Apache Camel endpoints can result in information exposure.

tags | paper
MD5 | 2f785d26379a9741d9315ce0f0471412
Buffer Overflows, C Programming, And More
Posted Jun 25, 2019
Authored by Ricky Sanders

This whitepaper discusses buffer overflows, C socket programming, NSA's GHIDRA, and much more.

tags | paper, overflow
MD5 | e3482cfa449fb9607ddac0208ae27d39
Threat Hunting - Hunter Or Hunted
Posted Jun 21, 2019
Authored by Akash Sarode

This whitepaper details methodologies in relation to threat hunting.

tags | paper
MD5 | 776bc317a0a2dda096dbe77bdce292ab
Sony PlayStation Vita (PS Vita) - Trinity: PSP Emulator Escape
Posted Jun 21, 2019
Authored by TheFloW

Trinity is a fully chained exploit for the PS Vita consisting of six unique vulnerabilities. It is based on a decade of knowledge and research. This is a long whitepaper detailing everything.

tags | exploit, paper, vulnerability
MD5 | 31b7f5a04ce38bb81a099b6084de26b0
Active Directory Enumeration With PowerShell
Posted Jun 14, 2019
Authored by Haboob Team

Whitepaper called Active Directory Enumeration with PowerShell.

tags | paper
MD5 | 9749bf4f1c728d560b607f1e3a15b07e
LDAP Swiss Army Knife
Posted Jun 12, 2019
Authored by Moritz Bechler | Site github.com

This paper presents the "LDAP Swiss Army Knife", an easy to use LDAP server implementation built for penetration oder software testing. Apart from general usage as a server or proxy it also shows some specific attacks against Java/JNDI based LDAP clients.

tags | paper, java
MD5 | a5b08197ac7d25c91698564ff5769d7b
Analysis Of CVE-2019-0708 (BlueKeep)
Posted Jun 4, 2019
Authored by MalwareTech

This whitepaper provides a thorough analysis of CVE-2019-0708, also known as BlueKeep.

tags | paper
MD5 | 16b0e4d9cb924ea1508a83175e8d1273
A Debugging Primer With CVE-2019-0708
Posted Jun 4, 2019
Authored by straight_blast

Whitepaper called A Debugging Primer with CVE-2019-0708.

tags | paper
advisories | CVE-2019-0708
MD5 | 6e54962ab2cce7123445b9f0b400b434
Web Application Firewall Bypass Methods
Posted May 24, 2019
Authored by Samet ARATOGLU

Whitepaper called Web Application Firewall Bypass Methods. Written In Turkish.

tags | paper, web, bypass
MD5 | 3d35d818f88542e7fe364c214be492bb
Penetration Testing Steps And Tools
Posted May 24, 2019
Authored by Yusa BAS

Whitepaper called Penetration Testing Steps and Tools. Written In Turkish.

tags | paper
MD5 | 4d97bb9bf96b21e872162c6c1a230690
ROOTCON 13 Call For Papers
Posted May 10, 2019
Site rootcon.org

The ROOTCON 13 Call For Papers has been announced. It will be held September 25th through the 27th, 2019 at the Taal Vista Hotel, Tagaytay, Philippines.

tags | paper, conference
MD5 | d347194b8b8cbd09d5e5bba0ff7ee29f
Johnny You Are Fired
Posted May 1, 2019
Authored by Juraj Somorovsky, Jorg Schwenk, Sebastian Schinzel, Damian Poddebniak, Hanno Bock, Jens Muller, Marcus Brinkmann

This archive contains proof of concepts and a whitepaper that describes multiple email client implementations where popular clients for email are vulnerable to signature spoofing attacks.

tags | exploit, paper, spoof, proof of concept
advisories | CVE-2017-17848, CVE-2018-12019, CVE-2018-12020, CVE-2018-12356, CVE-2018-12556, CVE-2018-15586, CVE-2018-15587, CVE-2018-15588, CVE-2018-18509, CVE-2019-8338
MD5 | d247e4ccd9f597d40309c5f5e797a348
Jumping Firewall With Tunneling Techniques
Posted Apr 30, 2019
Authored by Muhammet Ates

This is a whitepaper that discusses bypassing a firewall using tunneling techniques. Written in Turkish.

tags | paper
MD5 | 6b0c08d69652748f958c31ee7769b37e
Redacted Report On The Investigation Into Russian Interference In The 2016 Presidential Election
Posted Apr 18, 2019
Authored by Special Counsel Robert S. Mueller III | Site justice.gov

Released 2019/04/18 by the United States Justice Department, this is the Report On The Investigation Into Russian Interference In The 2016 Presidential Election. This is the redacted version.

tags | paper
MD5 | ce5859e9b5d8b76aedd18dc296dcc1e6
Hackers 2 Hackers Conference 16th Edition Call For Papers
Posted Apr 8, 2019
Site h2hc.com.br

The call for papers for H2HC 16th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 26th through the 27th, 2019.

tags | paper, conference
MD5 | 4c732ebf34f1ec81c10c71b8ad5716cb
hardwear.io 2019 Call For Papers
Posted Apr 5, 2019
Authored by hardwear.io CFP

hardwear is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper. A conference in the USA will take place June 11th through the 14th, 2019 and another will take place in the Netherlands September 23rd through the 27th.

tags | paper, conference
MD5 | c2fb7f675674da300f0f76c6ac3d0d95
c0c0n 2019 Call For Papers
Posted Apr 5, 2019
Site is-ra.org

The c0c0n 2019 call for papers has been announced. It will take place September 25th through the 28th, 2019 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
MD5 | 7249c0266d14ba00f16c8728632d4033
RECON 2019 Call For Papers
Posted Mar 26, 2019
Authored by REC0N Montreal 2019 | Site recon.cx

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It will be held June 28th through the 30th, 2019, in Montreal, Canada.

tags | paper, conference
MD5 | 20b57c81c732a0f0d02f1daae7178ad4
JMX RMI - Multiple Applications RCE
Posted Mar 26, 2019
Authored by redtimmysec

This whitepaper discusses highlights of findings related to remote code execution leveraging JMX/RMI.

tags | paper, remote, code execution
advisories | CVE-2018-11247, CVE-2018-8016, CVE-2019-7727
MD5 | 6ff134ecb65e85ce3c03348a2f8cc3e1
Microsoft Windows Binary Planting
Posted Mar 18, 2019
Authored by Frederic Bourla

This is a short write-up on binary planting along with a few old-school 0-days which may still be helpful for pentesters willing to escalate privileges on Windows.

tags | paper
systems | windows
MD5 | 2610f1f8b017ac3a538d7e379b554592
IPv6 Security For IPv4 Engineers
Posted Mar 14, 2019
Authored by Fernando Gont

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as much of the existing IPv4 knowledge and experience as possible. It highlights the security issues that affect both protocols in the same manner, as well as those that are new or different for the IPv6 protocol suite. Additionally, it discusses the security implications arising from the co-existence of the IPv6 and IPv4 protocols.

tags | paper, protocol
MD5 | 3c7ad3f60f63c849f9bff9b85784a99a
How Do You Use An XSS As A Keylogger?
Posted Mar 10, 2019
Authored by Ismail Tasdelen

This is the world's shortest whitepaper showing how to use javascript to record keystrokes and log them.

tags | paper, javascript
MD5 | 7b93299171e5f7b4226507db4f42a273
Flexpaper 2.3.6 Remote Code Execution
Posted Mar 8, 2019
Authored by Marco Ortisi

Whitepaper discussing Flexpaper versions 2.3.6 and below which suffer from a remote code execution vulnerability.

tags | exploit, paper, remote, code execution
MD5 | 331487287912b9a46dcc93be2d9569a4
File Transfer Skills In The Red Team Post Penetration Test
Posted Mar 7, 2019
Authored by xax007

Whitepaper called File transfer skills in the red team post penetration test.

tags | paper
MD5 | 9afe5f91a9c54df50eebf28e7275df4e
Page 1 of 138

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By