exploit the possibilities
Showing 1 - 25 of 3,505 RSS Feed

Whitepaper Files

The ShellShock Attack
Posted Feb 24, 2020
Authored by Nayan Das

Whitepaper called The Shellshock Attack. It covers all of the required topics for understanding the Shellshock vulnerability. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector and the process of exploitation.

tags | paper, proof of concept
MD5 | 4600ed628f8ef50e450bf87a055b884e
The Network Protocol Cheatsheet
Posted Feb 24, 2020
Authored by Riddhi Suryavanshi

This document is intended for students and security professionals as a quick reference for networking protocols. It covers 50 protocols classified according to the OSI Layer they operate on. The corresponding RFC has been provided to further check for parameters / commands of a particular protocol. From a security perspective, the corresponding attacks / vulnerabilities are also included in this cheatsheet.

tags | paper, vulnerability, protocol
MD5 | 5283f87c171d89b2a5c9d8ddec708942
SCADA Modbus Vulns
Posted Feb 24, 2020
Authored by Harun Seker

Whitepaper called SCADA Modbus Vulns. Written in Turkish.

tags | paper
MD5 | 7c3d4bd58f440e5f3e5909bf1e1312d1
WordPress Security
Posted Feb 21, 2020
Authored by Haktan Emik

Whitepaper called WordPress Security. Written in Turkish.

tags | paper
MD5 | f630a271d334c2aca061b30768228934
Penetration Testing Labs
Posted Feb 20, 2020
Authored by Tolga Kizilkaya

This whitepaper is called Penetration Testing Labs. Written in Turkish.

tags | paper
MD5 | 67479a3ab927f091dbaab48acfc5924e
Understanding MQTT And CoAP Protocols
Posted Feb 20, 2020
Authored by Tarun Bareja

Whitepaper called Understanding MQTT and CoAP Protocols.

tags | paper, protocol
MD5 | e284f661cebc37ca3be1436a3f4ce711
Android Pentest Tutorial Step By Step
Posted Feb 20, 2020
Authored by Meisam Monsef

Whitepaper called Android Pentest Tutorial Step By Step. Written in Persian.

tags | paper
MD5 | 23d6e17529f94a8d40e38dc01684d806
MQTT Protocol Overview
Posted Feb 19, 2020
Authored by Kunal Bharti

This whitepaper provides an overview of the MQTT protocol. MQTT is a is an open OASIS and ISO standard (ISO/IEC PRF 20922) lightweight, simple machine to machine TCP/IP based protocol which can be used for communication between IoT devices.

tags | paper, tcp, protocol
MD5 | e95a8a5bfa307e3c6ccbf6b1426de529
Nmap Scanning - Getting Started
Posted Feb 19, 2020
Authored by Anmol K Sachan

This whitepaper goes over the basics of portscanning and how to use nmap.

tags | paper
MD5 | 408a17ba924f0188db7a9dc1bf918045
Unexplored Warfare Of 21st Century
Posted Feb 17, 2020
Authored by Monika Arora, Esha Chadha, Kartik Verma

Whitepaper called Unexplored Warfare of 21st Century. It analyzes Pegasus and Chrysaor.

tags | paper
MD5 | 33db79693b0c5b565e2219483dc8c09a
Web Application Firewall Bypass Via Bluecoat Device
Posted Feb 17, 2020
Authored by redtimmysec

Whitepaper called Web Application Firewall Bypass via Bluecoat Device.

tags | paper, web
MD5 | 8188e75fa2146b581bd080778464328c
Collecting The Data From Volatile Memory In Digital Forensics
Posted Feb 17, 2020
Authored by Khushank Raj Mahawan

Whitepaper called Collecting the Data from Volatile Memory in Digital Forensics.

tags | paper
MD5 | 1f11de719ced61b37f246d41edf92fca
Hypervisor Necromancy - Reanimating Kernel Protectors
Posted Feb 15, 2020
Authored by phrack, Aris Thallas

Whitepaper called Hypervisor Necromancy - Reanimating Kernel Protectors.

tags | paper, kernel
MD5 | fed9693bce3cb6739d0226ae3503c6da
The R.A.T In The Shell
Posted Feb 14, 2020
Authored by Pradyumn Khanchandani, Siddharth Balyan, Monika Arora

This whitepaper is an analysis of the breach into the Kudankulam Nuclear Power Plant through the lens of Cyber Kill Chain, the study of remote access trojans, and the targeting of critical infrastructure.

tags | paper, remote, trojan
MD5 | c9ed98dbcbf5c0a3dfbec128ccf74d1b
HTTP DoS / DDoS Tools User Manual
Posted Feb 14, 2020
Authored by Merve Latife Say

This whitepaper acts as a user manual to go over HTTP DoS and DDoS tooling. Written in Turkish.

tags | paper, web, denial of service
MD5 | d150e08fa6ec2e09d8267192579b4de1
Packet Sniffer To Sniff Sensitive Credentials Only
Posted Feb 13, 2020
Authored by Roshan Poudel

Whitepaper called Packet Sniffer to Sniff Sensitive Credentials Only.

tags | paper
MD5 | fccb94cbfba25dc0528f289cc32f6721
Apache2 Web Server Hardening Article
Posted Feb 10, 2020
Authored by Kadir Yapar

This is an article discussing Apache2 Web Server hardening. Written in Turkish.

tags | paper, web, conference
MD5 | 714af65b9e8c39a13763f187340761c8
Bsides Brussels 2020 Call For Papers
Posted Feb 7, 2020
Authored by BSides Brussels | Site bsidesbrussels.org

BSides Brussels is a security conference in Brussels, Belgium, with talks, workshops and villages. The goal is to strengthen the exchange of knowledge, cooperation, communication, and integration between the different actors active in the IT security industry. We are pleased to announce that the first edition of BSides Brussels will be held on May 28th, 2020.

tags | paper, conference
MD5 | dd37a81441d49edfc36e142b592ed89f
REVULN 20x2 Call For Papers
Posted Feb 3, 2020
Authored by REVULN

REVULN 20x2 is an international conference taking place the June 25th through the 26th, 2020 in St. Paul's Bay (Malta) at the Hotel Santana.

tags | paper, conference
MD5 | 5ff239aa515c6d0b4350aad7cb8f9b47
REVULN 20x1 Call For Papers
Posted Feb 3, 2020
Authored by REVULN

REVULN 20x1 is an international conference taking place the April 28th through the 30th, 2020 in Metro Manila (Philippines) at the RED Hotel Cubao.

tags | paper, conference
MD5 | f056b932638992744402d575aef22452
LeHACK 2020 Call For Papers
Posted Feb 3, 2020
Authored by Le HACK Conference | Site submit.lehack.org

LeHACK 2020 is a yearly rendezvous where hackers and aficionados are meeting with both technical and non-technical talks and workshops about hacking. It is a great place to discover, to learn, to teach and be taught in the magical city of Paris. LeHACK 2020 will be held in La Cite des Sciences et de l'Industire in Paris, France from June 26th through the 27th, 2020.

tags | paper, conference
MD5 | 2fecce4977a35ea552d93179dfb22375
Hunting Process Injection By Windows API Calls
Posted Jan 30, 2020
Authored by Uriel Kosayev, Nir Yehoshua

Whitepaper called Hunting Process Injection By Windows API Calls.

tags | paper
systems | windows
MD5 | d8cdf69a64e4e424c4ea91d7cae8f5b4
Positive Hack Days 10 Call For Papers
Posted Jan 28, 2020
Site phdays.com

Call For Papers for Positive Hack Days 10 which will take place in Moscow, Russia May 13th through the 14th, 2020.

tags | paper, conference
MD5 | cc687333b074bbb77684a5767d01a60a
Bypassing A Null Byte POP/POP/RET Sequence
Posted Dec 25, 2019
Authored by FULLSHADE

This whitepaper covers a new technique that utilizes DLL injection to inject a custom DLL into a running vulnerable process to add a POP POP RET sequence in the scenario that the vulnerable program does not include any null byte free sequences. This is a useful technique to exploit SEH buffer overflow attacks successfully.

tags | paper, overflow
MD5 | bb80127d68605a1a12195a050601b797
Don't Break The Door, The Key Is Under The Doormat
Posted Dec 19, 2019
Authored by Gerard Fuguet

Whitepaper called Don't Break The Door, The Key Is Under The Doormat.

tags | paper
MD5 | c9dc48f0955811c0252b1bea14bb3b59
Page 1 of 141

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By