ignore security and it'll go away
Showing 1 - 25 of 3,296 RSS Feed

Whitepaper Files

RECON Brussels 2018 Call For Papers
Posted Sep 19, 2017
Authored by RECON Brussels 2018 | Site recon.cx

RECON Brussels has announced it's call for papers. The conference will take place January 29th through February 4th, 2018 in Brussels, Belgium.

tags | paper, conference
MD5 | b8cd79d146f9f4323ceb0141217dd86c
Code Injection - HTML Injection
Posted Sep 4, 2017
Authored by Shritam Bhowmick

Whitepaper that discussions both code and html injection attacks.

tags | paper
MD5 | 8a32755f82e4b581a5491e4fbe4cb3af
Offensive And Defensive PowerShell
Posted Aug 28, 2017
Authored by Halil Dalabasmaz

Whitepaper called Offensive and Defensive PowerShell. Written in Turkish.

tags | paper
MD5 | 7be9cc28ce3b4845f5306c8fc586420d
Hidden Network: Detecting Hidden Networks Created With USB Devices
Posted Jul 13, 2017
Authored by Francisco Jose Ramirez Vicente, Pablo Gonzalez Perez

Whitepaper called Hidden Network: Detecting Hidden Networks created with USB Devices.

tags | paper
MD5 | 40432b7a852ac9dc2303afdfbd464da4
Ekoparty 2017 Call For Papers
Posted Jul 13, 2017
Site cfp.ekoparty.org

The thirteenth edition of the Ekoparty Security Conference has announced its Call For Papers. It will take place September 25th through the 29th, 2017 in Buenos Aires, Argentina.

tags | paper, conference
MD5 | 55d93f440a8cfc3c01ca106ac90cdbe4
ToorCon 19 Call For Papers
Posted Jul 10, 2017
Site sandiego.toorcon.net

ToorCon 19 has announced its call for papers. This conference will take place September 1st through the 3rd, 2017 in San Diego, CA, USA.

tags | paper, conference
MD5 | ab72109010be30c6fdbfb50303e718ba
SYN Flood Attack For IP Cisco Phone
Posted Jul 3, 2017
Authored by Regis Deldicque

Whitepaper called SYN Flood Attack for IP Cisco Phone. Written in French.

tags | paper
systems | cisco
MD5 | d236839b9f4ea29e19d287fe756a995a
Fully Undetectable Malware
Posted Jun 26, 2017
Authored by Alessandro Groppo

Whitepaper called Fully Undetectable Malware. Translated to English.

tags | paper
MD5 | d68cb4f5d9b821df21203ba5a14b4e8a
Introduction To Honeypots
Posted Jun 24, 2017
Authored by Ahmed Al Mutairi

This whitepaper gives an introduction to honeypots. Written in Arabic.

tags | paper
MD5 | fec929e7e01e1bfea85418af51150cf1
OffensiveCon Berlin 2018 Call For Papers
Posted Jun 22, 2017
Site offensivecon.org

OffensiveCon Berlin 2018 has announced its call for papers. It will take place February 16th through the 17th, 2018 in Berlin, Germany.

tags | paper, conference
MD5 | 32acfe671da7b738e3a0ce113154dc3d
Web Application Penetration Testing Techniques
Posted Jun 15, 2017
Authored by Ahmed Al Mutairi

This is a brief whitepaper written in Arabic that gives some examples of tools that can be used to hack systems.

tags | paper
MD5 | 572bf4e683d8f97acf40bb8d297c0758
Exploit Shellcode Development
Posted Jun 13, 2017
Authored by Fatih Emiral

Whitepaper called Exploit Shellcode Development. Written in Turkish.

tags | paper, shellcode
MD5 | 46d75f2c7f2809cec71ad9419f75edc1
t2'17 Call For Papers
Posted Jun 12, 2017
Site t2.fi

The t2'17 Call For Papers has been announced. It will take place October 26th through the 27th, 2017 in Helsinki, Finland.

tags | paper, conference
MD5 | 9545fdcba52aaa783415d4f0c7353a7e
New Methods Of Payload Delivery - MSFVenom
Posted Jun 9, 2017
Authored by Zed Hamad

Short whitepaper called New Methods of Payload Delivery - MSFVenom.

tags | paper
MD5 | 9dec8285aef4b1f15a2800a8e8f209b5
EternalBlue Exploit Analysis And Port To Microsoft Windows 10
Posted Jun 7, 2017
Authored by Sean Dillon, Dylan Davis

On April 14, 2017, the Shadow Brokers Group released the FUZZBUNCH framework, an exploitation toolkit for Microsoft Windows. The toolkit was allegedly written by the Equation Group, a highly sophisticated threat actor suspected of being tied to the United States National Security Agency (NSA). The framework included ETERNALBLUE, a remote kernel exploit originally targeting the Server Message Block (SMB) service on Microsoft Windows XP (Server 2003) and Microsoft Windows 7 (Server 2008 R2). In this paper, the RiskSense Cyber Security Research team analyzes how using wrong-sized CPU registers leads to a seemingly innocuous mathematical miscalculation. This causes a chain reaction domino effect ultimately culminating in code execution, making ETERNALBLUE one of the most complex exploits ever written. They will discuss what was necessary to port the exploit to Microsoft Windows 10, and future mitigations Microsoft has already deployed, which can prevent vulnerabilities of this class from being exploited in the future. The FUZZBUNCH version of the exploit contains an Address Space Layout Randomization (ASLR) bypass, and the Microsoft Windows 10 version required an additional Data Execution Prevention (DEP) bypass not needed in the original exploit.

tags | paper, remote, kernel, vulnerability, code execution
systems | windows, xp, 7
MD5 | 0e04e472a5f9e98389f5f1e13ec2bf50
Of Mice And Keyboards
Posted Jun 1, 2017
Authored by Matthias Deeg, Gerhard Klostermeier

Whitepaper call Of Mice and Keyboards. This write up gives you an overview on the security of modern wireless desktop sets.

tags | paper
MD5 | 82baeb29b56fe4569ce8c6faa36623bc
Hacktivity 2017 Call For Papers
Posted May 29, 2017
Site hacktivity.com

The Hacktivity 2017 Call For Papers has been announced. It will be held from October 20th through the 21st, 2017 in Budapest, Hungary.

tags | paper, conference
MD5 | d1de9c885c7ef80fc279c6d6aa34b21e
Introduction To Manual Backdooring
Posted May 25, 2017
Authored by abatchy17

Whitepaper called Introduction to Manual Backdooring.

tags | paper
MD5 | 30829082cfceb91b0d00c9a317f9509a
Microsoft Azure Cloud Audit Using Powershell
Posted May 23, 2017
Authored by Parag Kamra

This brief whitepaper discusses using Powershell to audit Microsoft Azure Cloud.

tags | paper
MD5 | 562a9d145b27b96c4f8e9dd276fc0cbe
WPES 2017 Call For Papers
Posted May 21, 2017
Authored by Bill Garrison

The 2017 Workshop on Privacy in the Electronic Society (WPES 2017) Call For Papers has been announced. It will take place in Dallas, Texas, USA on October 30, 2017.

tags | paper, conference
MD5 | b69494235860fa0c966f1474afeaab09
Stealing Windows Credentials Using Google Chrome
Posted May 18, 2017
Authored by Bosko Stankovic

This paper describes an attack which can lead to Windows credentials theft, affecting the default configuration of the most popular browser in the world today, Google Chrome, as well as all Windows versions supporting it.

tags | paper
systems | windows
MD5 | a16cf3db1d86c6bd43dd6a775f759374
DNS Backchannel
Posted May 12, 2017
Authored by Finn Steglich

This whitepaper discussing using the Domain Name System (DNS) to communicate with hosts in separated networks using the open source tool outis.

tags | paper
MD5 | 65b92759a9b48cee3f0a1add8bbab003
Side Channel Attack Countermeasures In Cryptographic Systems
Posted May 10, 2017
Authored by James Fell

Side channel attacks against cryptographic systems involve identifying ways in which their physical implementations leak useful information. A cryptographic algorithm may be secure on paper but when implemented on physical hardware some of the secret data, such as key bits, may potentially be recovered by an attacker by measuring various physical properties whilst encryption or decryption is being performed. This essay reviews the most successful countermeasures that can be used to make different classes of side channel attacks as difficult as possible. An understanding of basic principles of cryptography is assumed.

tags | paper
MD5 | cac393efbdd310e9a2ca73805bcb9ebd
BluedIoT: When A Mature And Immature Technology Mixes, Becomes An Idiot Situation
Posted May 3, 2017
Authored by Gerard Fuguet

Whitepaper called BluedIoT: When a mature and immature technology mixes, becomes an "idiot" situation.

tags | paper
MD5 | 354a4d6912f8718e27ab4e72caee78c9
IML 2017 Call For Papers
Posted Apr 29, 2017
Site bindscience.com

The International Conference on Internet of Things and Machine Learning (IML 2017) will be held from October 17th through the 18th, 2017 in Liverpool John Moores University, Liverpool city, United Kingdom. Through its technical program, the conference aims to provide an outstanding opportunity for both academic and industrial communities alike to address new trends and challenges, emerging technologies and progress in standards on topics relevant to today's fast moving areas of Internet of Things and Machine Learning. This workshop will discuss new results in the field of Internet of things and machine learning.

tags | paper, conference
MD5 | 7bd2c1391afd79fcb4dcfceb63063887
Page 1 of 132

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    10 Files
  • 23
    Sep 23rd
    1 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By