Twenty Year Anniversary
Showing 1 - 25 of 3,370 RSS Feed

Whitepaper Files

Rikki Don't Lose That Bluetooth Device
Posted Jul 11, 2018
Authored by Matthias Deeg, Gerhard Klostermeier

In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don't want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

tags | paper
MD5 | ca29bc7edd73c43f926cb262ce678f74
UAC Bypass And Research With UAC-A-Mola
Posted Jun 28, 2018
Authored by Pablo Gonzalez Perez, Santiago Hernandez Ramos

Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.

tags | paper, bypass
MD5 | 9db859b7c52f75528ae79aa88beb8b30
Case Study: Security Of Modern Bluetooth Keyboards
Posted Jun 22, 2018
Authored by Matthias Deeg, Gerhard Klostermeier

This whitepaper is a case study that analyzes the security of modern bluetooth keyboards. In the course of this research project, SySS GmbH analyzed three currently popular wireless keyboards using Bluetooth technology that can be bought on the Amazon marketplace for security vulnerabilities. The following three devices were tested for security issues from different attacker perspectives: 1byoneKeyboard, LogitechK480, and MicrosoftDesignerBluetoothDesktop (Model1678 2017).

tags | paper, vulnerability
MD5 | 066966c0a18d2c6ee4c885c5fb48bd21
Database Security Threats And Injection Technique
Posted Jun 19, 2018
Authored by darklight

Whitepaper called Database Security Threats and Injection Technique. Written in Persian.

tags | paper
MD5 | a7cb1ede4efa8d33b346b8a369054622
EggHunter Buffer Overflow For Windows
Posted Jun 14, 2018
Authored by Haboob Team

Whitepaper called EggHunter Buffer Overflow for Windows. Written in Arabic.

tags | paper, overflow
systems | windows
MD5 | 7530d81f5ea60524126e7b277d92327b
Lateral Movement Using WinRM
Posted Jun 14, 2018
Authored by Haboob Team

Whitepaper called Lateral Movement using WinRM. Written in Arabic.

tags | paper
MD5 | ae51d28d40ed1f07fccc954c21dc8733
Reverse Engineering - Simple Patching
Posted Jun 11, 2018
Authored by Haboob Team

Whitepaper called Reverse Engineering - Simple Patching. Written in Arabic.

tags | paper
MD5 | 68a7ae72fae2210e2a4d9ace43c125d5
Android Application Pentest With Drozer
Posted Jun 1, 2018
Authored by Artin Ghafary

Whitepaper called Android Application Pentest With Drozer. Written in Persian.

tags | paper
MD5 | bce46a39c54c0e5f1caa0c8d31110f1f
SEH Buffer Overflow Basic Exploitation Tutorial
Posted Jun 1, 2018
Authored by Haboob Team

This is a SEH buffer overflow basic exploitation tutorial. Written in Arabic.

tags | paper, overflow
MD5 | d914b71bb22db16a92bb6096551d3397
Deserialization Vulnerabilities
Posted May 26, 2018
Authored by intx0x80

This whitepaper explains deserialization vulnerabilities in Java, Python, PHP, and Ruby.

tags | paper, java, php, vulnerability, python, ruby
MD5 | 003eecb39455d3d75ab4d3f37d2cb166
Introduction To Wireless Network Penetration Testing
Posted May 23, 2018
Authored by Moslem Haghighian

Whitepaper called Introduction to Wireless Network Penetration Testing. Written in Persian.

tags | paper
MD5 | 1b19373c6ccb377a6400ea115b877a24
Code Review Steps And Methodologies
Posted May 23, 2018
Authored by Jameel Nabbo

Whitepaper called Code Review Steps and Methodologies.

tags | paper
MD5 | 735525da63576a35964d6bc60e144a48
Web Forensics
Posted May 10, 2018
Authored by ManhNho

Whitepaper called Web Forensics. Written in Vietnamese.

tags | paper, web
MD5 | 82843c871392c0d0efffb6e7058c21d6
t2'18 Call For Papers
Posted May 9, 2018
Authored by // | Site

The t2'18 Call For Papers has been announced. It will take place October 25th through the 26th, 2018 in Helsinki, Finland.

tags | paper, conference
MD5 | df30ce4b46b221596a408d208f4749cc
Linux Restricted Shell Bypass Guide
Posted May 6, 2018
Authored by n4ckhcker, h4d3sw0rm

Whitepaper titled Linux Restricted Shell Bypass Guide.

tags | paper, shell
systems | linux
MD5 | d27133695ec11bcee5f1145b62e7f195
Windows Kernel Exploitation Tutorial Part 8: Use After Free
Posted May 4, 2018
Authored by rootkit

Whitepaper called Windows Kernel Exploitation Tutorial Part 8: Use After Free.

tags | paper, kernel
systems | windows
MD5 | 89f76cdffee77908ed5e8f26120672b7
Hack In The Box GSEC 2018 Singpaore Call For Papers
Posted Apr 27, 2018

Final call for the 2018 Hack In The Box (HITB) GSEC conference in Singapore. HITB GSEC is a 3-day deep knowledge security conference where attendees get to vote on the final agenda of talks and and to meet with the speakers they voted for.

tags | paper, conference
MD5 | 213db60f4f90257921f74bd543bf47f1
Nintendo Switch / Nvidia Fusee Gelee Disclosure
Posted Apr 26, 2018
Authored by Katherine Temkin

This report documents Fusee Gelee, a coldboot vulnerability that allows full, unauthenticated arbitrary code execution from an early bootROM context via Tegra Recovery Mode (RCM) on NVIDIA's Tegra line of embedded processors. As this vulnerability allows arbitrary code execution on the Boot and Power Management Processor (BPMP) before any lock-outs take effect, this vulnerability compromises the entire root-of-trust for each processor, and allows exfiltration of secrets e.g. burned into device fuses.

tags | paper, arbitrary, root, code execution
MD5 | 0ab768a01218de89b109624ec71ed96b
Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework
Posted Apr 24, 2018
Authored by Santiago Hernandez Ramos

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.

tags | paper, protocol, fuzzer
MD5 | 9eca60d90eccec483d8294bf95607a9b
Bridging The Gap Between SIPR And NIPR Using KVM Switches
Posted Apr 24, 2018
Authored by

This paper documents a minor but somewhat easy way to compromise air gapped systems that share a kvm.

tags | paper
MD5 | dc6b2a5f7beae67e10dd8d98be983b41
The Origin And Impact Of Security Vulnerabilities In ST Chipsets
Posted Apr 21, 2018

This whitepaper explores the origin and impact of the vulnerabilities discovered in ST chipsets.

tags | paper, vulnerability
MD5 | 0c95d5b2547b920efafeca36b10548c1
Diamorphine LKM Analysis
Posted Apr 18, 2018
Authored by x90c

This whitepaper provides diamorphine linux kernel rootkit analysis. Written in Korean.

tags | paper, kernel
systems | linux
MD5 | f542b2e90a44111c569a1dbf65f9d93a
Polymorph: A Real-Time Network Packet Manipulation Framework
Posted Apr 16, 2018
Authored by Santiago Hernandez Ramos

Whitepaper called Polymorph: A Real-Time Network Packet Manipulation Framework.

tags | paper
MD5 | f4fa6a587308484e8825734647e49d76
Smashing Smart Contracts
Posted Apr 13, 2018
Authored by Bernhard Mueller

This pop-scientific conference paper introduces Mythril, a security analysis tool for Ethereum smart contracts, and its symbolic execution backend LASER-Ethereum. The first part of the paper explains symbolic execution of Ethereum bytecode in a largely formal manner. The second part showcases the vulnerability detection modules already implemented in Mythril. The modules use a pragmatic mix of static analysis, symbolic analysis and control flow checking.

tags | paper
MD5 | 689b059f5f52ffa4211e9e02e8310af5
WOOT 12 Call For Papers
Posted Apr 11, 2018

WOOT '12 Call For Papers - This will be held August 13th through the 14th, 2018, in Baltimore, MD, USA. WOOT '12 is co-located with the USENIX Security Symposium.

tags | paper, conference
MD5 | 48289f763611d907fca2fc46ad5d9195
Page 1 of 135

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    21 Files
  • 17
    Jul 17th
    4 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By