Exploit the possiblities
Showing 1 - 25 of 3,301 RSS Feed

Whitepaper Files

Bypassing Browser Security Policies For Fun And Profit
Posted Nov 6, 2017
Authored by Rafay Baloch

In this paper, the authors present their research about bypassing core security policies implemented inside browsers such as the "Same Origin Policy". They present several bypasses that were found in various mobile browsers. In addition, they also uncover other interesting security flaws found during their research such as Address Bar Spoofing, Content Spoofing, Cross Origin CSS Attacks, Charset Inheritance, CSP Bypass, Mixed Content Bypass etc. as found in Android Browsers. This is from a talk given at BlackHat ASIA 2016.

tags | paper, spoof
MD5 | ae67f5ff17aa89a494c33e64468b75e0
WorldCIST 18 Call For Papers
Posted Nov 6, 2017
Site worldcist.org

The Information Systems and Technologies research and industrial community is invited to submit proposals of Workshops for WorldCist'18. It will be held in Naples, Italy March 27th through the 29th, 2018.

tags | paper, conference
MD5 | 2218e42d14a7e7428348484f3cf2bfb6
Hacksys Extreme Vulnerable Windows Driver Analysis Part 1
Posted Oct 19, 2017
Authored by Alireza Chegini

Whitepaper called Hacksys Extreme Vulnerable Windows Driver Analysis. Part 1 of a series. Written in Arabic.

tags | paper
systems | windows
MD5 | c6aaef0e16af84719f2f55fdbf70e8db
Key Reinstallation: Forcing Nonce Reuse In WPA2
Posted Oct 16, 2017
Authored by Frank Piessens, Mathy Vanhoef | Site krackattacks.com

Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected.

tags | paper, crypto, protocol
advisories | CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088
MD5 | 9ae08a7eee791f7977ada5c05ba50f29
nullcon Goa 2018 Call For Papers
Posted Oct 4, 2017
Site nullcon.net

The Call For Papers for nullcon Goa 2018 is now open. It's the time of the year when they welcome research done by the community as paper submissions for nullcon. So, sip your coffee, dust your debuggers, fire your tools, challenge your grey cells and shoot them an email. It will take place March 2nd through the 3rd, 2018 in Goa, India.

tags | paper, conference
MD5 | 03cceca06a854253d0f37ba9b89ab7b9
RECON Brussels 2018 Call For Papers
Posted Sep 19, 2017
Authored by RECON Brussels 2018 | Site recon.cx

RECON Brussels has announced it's call for papers. The conference will take place January 29th through February 4th, 2018 in Brussels, Belgium.

tags | paper, conference
MD5 | b8cd79d146f9f4323ceb0141217dd86c
Code Injection - HTML Injection
Posted Sep 4, 2017
Authored by Shritam Bhowmick

Whitepaper that discussions both code and html injection attacks.

tags | paper
MD5 | 8a32755f82e4b581a5491e4fbe4cb3af
Offensive And Defensive PowerShell
Posted Aug 28, 2017
Authored by Halil Dalabasmaz

Whitepaper called Offensive and Defensive PowerShell. Written in Turkish.

tags | paper
MD5 | 7be9cc28ce3b4845f5306c8fc586420d
Hidden Network: Detecting Hidden Networks Created With USB Devices
Posted Jul 13, 2017
Authored by Francisco Jose Ramirez Vicente, Pablo Gonzalez Perez

Whitepaper called Hidden Network: Detecting Hidden Networks created with USB Devices.

tags | paper
MD5 | 40432b7a852ac9dc2303afdfbd464da4
Ekoparty 2017 Call For Papers
Posted Jul 13, 2017
Site cfp.ekoparty.org

The thirteenth edition of the Ekoparty Security Conference has announced its Call For Papers. It will take place September 25th through the 29th, 2017 in Buenos Aires, Argentina.

tags | paper, conference
MD5 | 55d93f440a8cfc3c01ca106ac90cdbe4
ToorCon 19 Call For Papers
Posted Jul 10, 2017
Site sandiego.toorcon.net

ToorCon 19 has announced its call for papers. This conference will take place September 1st through the 3rd, 2017 in San Diego, CA, USA.

tags | paper, conference
MD5 | ab72109010be30c6fdbfb50303e718ba
SYN Flood Attack For IP Cisco Phone
Posted Jul 3, 2017
Authored by Regis Deldicque

Whitepaper called SYN Flood Attack for IP Cisco Phone. Written in French.

tags | paper
systems | cisco
MD5 | d236839b9f4ea29e19d287fe756a995a
Fully Undetectable Malware
Posted Jun 26, 2017
Authored by Alessandro Groppo

Whitepaper called Fully Undetectable Malware. Translated to English.

tags | paper
MD5 | d68cb4f5d9b821df21203ba5a14b4e8a
Introduction To Honeypots
Posted Jun 24, 2017
Authored by Ahmed Al Mutairi

This whitepaper gives an introduction to honeypots. Written in Arabic.

tags | paper
MD5 | fec929e7e01e1bfea85418af51150cf1
OffensiveCon Berlin 2018 Call For Papers
Posted Jun 22, 2017
Site offensivecon.org

OffensiveCon Berlin 2018 has announced its call for papers. It will take place February 16th through the 17th, 2018 in Berlin, Germany.

tags | paper, conference
MD5 | 32acfe671da7b738e3a0ce113154dc3d
Web Application Penetration Testing Techniques
Posted Jun 15, 2017
Authored by Ahmed Al Mutairi

This is a brief whitepaper written in Arabic that gives some examples of tools that can be used to hack systems.

tags | paper
MD5 | 572bf4e683d8f97acf40bb8d297c0758
Exploit Shellcode Development
Posted Jun 13, 2017
Authored by Fatih Emiral

Whitepaper called Exploit Shellcode Development. Written in Turkish.

tags | paper, shellcode
MD5 | 46d75f2c7f2809cec71ad9419f75edc1
t2'17 Call For Papers
Posted Jun 12, 2017
Site t2.fi

The t2'17 Call For Papers has been announced. It will take place October 26th through the 27th, 2017 in Helsinki, Finland.

tags | paper, conference
MD5 | 9545fdcba52aaa783415d4f0c7353a7e
New Methods Of Payload Delivery - MSFVenom
Posted Jun 9, 2017
Authored by Zed Hamad

Short whitepaper called New Methods of Payload Delivery - MSFVenom.

tags | paper
MD5 | 9dec8285aef4b1f15a2800a8e8f209b5
EternalBlue Exploit Analysis And Port To Microsoft Windows 10
Posted Jun 7, 2017
Authored by Sean Dillon, Dylan Davis

On April 14, 2017, the Shadow Brokers Group released the FUZZBUNCH framework, an exploitation toolkit for Microsoft Windows. The toolkit was allegedly written by the Equation Group, a highly sophisticated threat actor suspected of being tied to the United States National Security Agency (NSA). The framework included ETERNALBLUE, a remote kernel exploit originally targeting the Server Message Block (SMB) service on Microsoft Windows XP (Server 2003) and Microsoft Windows 7 (Server 2008 R2). In this paper, the RiskSense Cyber Security Research team analyzes how using wrong-sized CPU registers leads to a seemingly innocuous mathematical miscalculation. This causes a chain reaction domino effect ultimately culminating in code execution, making ETERNALBLUE one of the most complex exploits ever written. They will discuss what was necessary to port the exploit to Microsoft Windows 10, and future mitigations Microsoft has already deployed, which can prevent vulnerabilities of this class from being exploited in the future. The FUZZBUNCH version of the exploit contains an Address Space Layout Randomization (ASLR) bypass, and the Microsoft Windows 10 version required an additional Data Execution Prevention (DEP) bypass not needed in the original exploit.

tags | paper, remote, kernel, vulnerability, code execution
systems | windows, xp, 7
MD5 | 0e04e472a5f9e98389f5f1e13ec2bf50
Of Mice And Keyboards
Posted Jun 1, 2017
Authored by Matthias Deeg, Gerhard Klostermeier

Whitepaper call Of Mice and Keyboards. This write up gives you an overview on the security of modern wireless desktop sets.

tags | paper
MD5 | 82baeb29b56fe4569ce8c6faa36623bc
Hacktivity 2017 Call For Papers
Posted May 29, 2017
Site hacktivity.com

The Hacktivity 2017 Call For Papers has been announced. It will be held from October 20th through the 21st, 2017 in Budapest, Hungary.

tags | paper, conference
MD5 | d1de9c885c7ef80fc279c6d6aa34b21e
Introduction To Manual Backdooring
Posted May 25, 2017
Authored by abatchy17

Whitepaper called Introduction to Manual Backdooring.

tags | paper
MD5 | 30829082cfceb91b0d00c9a317f9509a
Microsoft Azure Cloud Audit Using Powershell
Posted May 23, 2017
Authored by Parag Kamra

This brief whitepaper discusses using Powershell to audit Microsoft Azure Cloud.

tags | paper
MD5 | 562a9d145b27b96c4f8e9dd276fc0cbe
WPES 2017 Call For Papers
Posted May 21, 2017
Authored by Bill Garrison

The 2017 Workshop on Privacy in the Electronic Society (WPES 2017) Call For Papers has been announced. It will take place in Dallas, Texas, USA on October 30, 2017.

tags | paper, conference
MD5 | b69494235860fa0c966f1474afeaab09
Page 1 of 133

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By