exploit the possibilities
Showing 1 - 25 of 3,605 RSS Feed

Whitepaper Files

Android Application Vulnerabilities
Posted Jan 26, 2021
Authored by SunCSR

Whitepaper called Android Application Vulnerabilities. Written in Vietnamese.

tags | paper, vulnerability
MD5 | 65ca4065964d00a8f0b73e9520869d1c
The Art Of XSS Escalation
Posted Jan 25, 2021
Authored by Mohammed Muteb

Whitepaper called The Art of XSS Escalation. Written in Arabic.

tags | paper
MD5 | bec232064a7047d5845620b18be13b0d
Kong Admin API Overview
Posted Jan 18, 2021
Authored by dash at undisclosed

This whitepaper compiles notes that can be useful to security researchers if access to the administrative API is achieved.

tags | paper
MD5 | 12f9554092c0319f6a27ae52e2d56846
UFW - A Beginners Guide To Linux Firewall
Posted Jan 15, 2021
Authored by Achint Basoya

Whitepaper called UFW - A Beginners Guide to Linux Firewall. The white paper is intended to provide information about a Linux firewall using a simple tool called UFW. It provides complete information on the tool and various ways through which users can create their own firewall rules to protects their assets.

tags | paper
systems | linux
MD5 | 3f0bb94817761f100839d5cdd6f95239
Deep Insight Into Social Engineering
Posted Jan 13, 2021
Authored by Pradyumn Khanchandani, Rushil Saxena

Whitepaper called Deep Insight into Social Engineering.

tags | paper
MD5 | 7ceee78fadaa96ded09aea1718d7ac19
Practical Insight Into Injections
Posted Jan 13, 2021
Authored by Hanut Kumar Arora

Whitepaper called Practical Insight into Injections. This document describes the meaning, working, implementation, and impact of injection vulnerabilities.

tags | paper, vulnerability
MD5 | 03c734fe0bc100e2234162e8efb3ea3b
Blind SSRF With Shellshock Exploitation
Posted Jan 12, 2021
Authored by Hardik Tyagi, Aman Saxena

Whitepaper called Blind SSRF with Shellshock Exploitation. It discusses how an attacker can leverage shellshock to also perform server-side request forgery attacks.

tags | paper
MD5 | 98b9ca178b7a872b9ca5107e78efa8e8
A Hands-On Approach To Linux Privilege Escalation
Posted Jan 12, 2021
Authored by Tanishq Sharma, Shikhar Saxena

Whitepaper called A Hands-On Approach To Linux Privilege Escalation. This document is intended to provide multiple techniques that a pentester can use to escalate their privileges and gain access to higher roles.

tags | paper
systems | linux
MD5 | f6cf10579b31e9f8440e8a43248cd662
Injections 101
Posted Jan 11, 2021
Authored by Hanut Kumar Arora

Whitepaper called Injections 101. It covers everything from SQL injection to XML injection.

tags | paper, sql injection
MD5 | bb362d2c2b41335a6bfbbf0942cf3a98
Wireshark For Noobs
Posted Jan 11, 2021
Authored by Anmol K Sachan

Whitepaper called Wireshark for Noobs.

tags | paper
MD5 | 0f96b685aa1b6798ca17d1c05562352f
Practical PHP Security
Posted Jan 8, 2021
Authored by Andrey Stoykov

Whitepaper called Practical PHP Security.

tags | paper, php
MD5 | ba9dacc8d65da0f08072dc4b5e4512f6
Ethical Hacking And Penetration Testing Guide
Posted Jan 8, 2021
Authored by Furkan Enes Polatoglu

Whitepaper called Ethical Hacking and Penetration Testing Guide. Written in Turkish.

tags | paper
MD5 | ae55abf53fb2c2ab6ef9f6b1cf481640
Understanding And Exploiting Zerologon
Posted Jan 6, 2021
Authored by Siddharth Balyan, Nandini Rana

Zerologon is a vulnerability in Microsoft's Netlogon Remote Procedural Call (MS-NRPC) protocol. Specifically, this vulnerability occurs due to an incorrect implementation of the AES-128 Counter Feedback mode of operation. This vulnerability was given a CVSS score of 10 by Microsoft and can be carried out by anyone with a foothold in the network. This paper aims to explain the detail and working of MS-NRPC protocol, its vulnerability, and finally cover how to exploit it, something which the original paper by Secura left out.

tags | paper, remote, protocol
advisories | CVE-2020-1472
MD5 | 941b59db31d2ceb9c4233ac44fa7d62a
A Hands-On Introduction To Insecure Deserialization
Posted Jan 4, 2021
Authored by Kartik Verma, Apaar Farmaha

Whitepaper called A Hands-On Introduction to Insecure Deserialization.

tags | paper
MD5 | ff4a19d6dc23115fa4812829935313d8
CarolinaCon 16 Call For Papers
Posted Dec 25, 2020
Site carolinacon.org

The 16th CarolinaCon was postponed in 2020 due to the pandemic but the conference will be hosted online in 2021. A new CFP has been announced.

tags | paper, conference
MD5 | 2e1ac4156f59b933bd88b2086ce0d990
Object Prototype Pollution Attack
Posted Dec 23, 2020
Authored by SunCSR

Whitepaper called Object Prototype Pollution Attack.

tags | paper
MD5 | 47102dc9d96a280fceb29bd1300d2a6a
Heartbleed Attack
Posted Dec 21, 2020
Authored by Jaspreet Singh, Siddhi Verma

This document is intended to provide a detailed study on the Heartbleed attack. It covers the required topics for understanding the exploit. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector of the process of exploitation.

tags | paper, proof of concept
advisories | CVE-2014-0160
MD5 | e8a2c00d2b65fcc1e497ac17d7e827ed
Secure Coding References
Posted Dec 21, 2020
Authored by ManhNho

Whitepaper that discusses secure coding practices and touches on security principles.

tags | paper
MD5 | 6bd59098e3d334a5c81d94a0d42083b3
Unmasking Hidden Sites
Posted Dec 21, 2020
Authored by labrat

This is a whitepaper that discusses unmasking hidden sites behind Cloudflare an Tor.

tags | paper
MD5 | aa7b2878375fcbbb79ba01d2357e1fe8
Exploit WordPress Plugin Vulnerability Using Static Source Code Analysis Techniques
Posted Dec 18, 2020
Authored by SunCSR

Whitepaper called Exploit WordPress Plugin Vulnerability Using Static Source Code Analysis Techniques.

tags | paper
MD5 | 5547d9c5988fdab38bfb79b10e2532b8
Mobile App Security
Posted Dec 9, 2020
Authored by SunCSR, Nghia Van Le

This is a brief whitepaper discussing best practices in mobile application security.

tags | paper
MD5 | 077ad6207fbdc6a00700a76feb4cde0c
API Security Overview
Posted Dec 8, 2020
Authored by SunCSR

Whitepaper called API Security Overview that discusses different types of flaws and exploitation of API insecurities.

tags | paper
MD5 | 569e9618b5cbeac20e8fe78ab24f61fe
Encrypted Linux x86-64 Loadable Kernel Modules (ELKM)
Posted Dec 4, 2020
Authored by cenobyte

Whitepaper called Encrypted Linux x86-64 Loadable Kernel Modules (ELKM). The aim is to protect kernel-based rootkits and implants against observation by EndpointDetection and Response (EDR) software and to neutralize the effects of recovery by disk forensics tooling.

tags | paper, x86, kernel
systems | linux
MD5 | 71edce142a1b2975b9d4d10c1398f3b2
Firmware Analysis And Simulation
Posted Dec 4, 2020
Authored by Prabhankar Tripathi

Whitepaper called Firmware Analysis and Simulation.

tags | paper
MD5 | c1364d9b1fdfd7d6a8410fdcb5a6c864
Digital Signage Systems - The Modern Hacker's Outreach
Posted Dec 3, 2020
Authored by LiquidWorm | Site zeroscience.mk

Whitepaper called Digital Signage Systems - The Modern Hacker's Outreach. It discusses everything from public incidents to common attack vectors leveraged to manipulate content.

tags | paper
MD5 | 5523c83e92054c30532290f6f4a597aa
Page 1 of 145

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    10 Files
  • 22
    Jan 22nd
    16 Files
  • 23
    Jan 23rd
    1 Files
  • 24
    Jan 24th
    1 Files
  • 25
    Jan 25th
    36 Files
  • 26
    Jan 26th
    26 Files
  • 27
    Jan 27th
    29 Files
  • 28
    Jan 28th
    22 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By