exploit the possibilities
Showing 26 - 50 of 3,502 RSS Feed

Whitepaper Files

Injecting .NET Ransomware Into Unmanaged Process
Posted Nov 19, 2019
Authored by Th3 0bservator

Whitepaper called Injecting .NET Ransomware into Unmanaged Process.

tags | paper
MD5 | 3c04c758b7cb9318e8040c19ec7fdbf2
HackBack - A DIY Guide To Rob Banks - Spanish Version
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks. Written in Spanish.

tags | paper
MD5 | 63058fff3240800bd66b55f04226be08
HackBack - A DIY Guide To Rob Banks
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks.

tags | paper
MD5 | 7fe8c92dfe5858a8ece2c480c3216d4b
c0c0n 2020 Call For Papers
Posted Nov 15, 2019
Site is-ra.org

The c0c0n 2020 Middle East call for papers has been announced. It will take place June 15th through the 18th, 2020 at the St. Regis in Abu Dhabi.

tags | paper, conference
MD5 | 35d0438d221ecc7f9f17cd53842e614f
YAML Deserialization Attack In Python
Posted Nov 13, 2019
Authored by Ashish Kukreti, Manmeet Singh

Whitepaper called YAML Deserialization Attack in Python.

tags | paper, python
MD5 | a9bfdb38ec8962eb6bdccd8b7cd59c70
I Own Your Building (Management System)
Posted Nov 12, 2019
Authored by LiquidWorm, Sipke Mellema | Site applied-risk.com

Whitepaper called I Own Your Building (Management System). It discusses various systems used to manage buildings and associated vulnerabilities with them.

tags | paper, vulnerability
MD5 | 8692e82de5e87a163782764b7bbeaff7
Covert Channel And Data Hiding In TCP/IP
Posted Nov 4, 2019
Authored by Roshan Poudel

Whitepaper called Covert Channel and Data Hiding in TCP/IP.

tags | paper, tcp
MD5 | 6fd8666907b5b1aeeb94914778c6b848
RootedCON 2020 Call For Papers
Posted Nov 1, 2019
Site cfp.rootedcon.com

RootedCON is a technology congress that will be held in Madrid (Spain) March 5th through the 7th, 2020. With an estimated seating from 2,000 and 2,500 people, is the most relevant specialized congress that is held in the country, and one of the most relevant in Europe, with attendee profiles ranging from students, Law Enforcement Agencies to professionals in the technology and information security market and, even, just passionate people.

tags | paper, conference
MD5 | 30d8fcbcd0f55d1d8721c199cf36e83c
Hacking The PS2 With Yabasic
Posted Oct 15, 2019
Authored by CTurt

Whitepaper that discusses hacking the Sony Playstation 2 with Yabasic.

tags | paper
MD5 | ef4d562726247dc6be934a633046b1bc
Exploit Wars II - The Server Strikes Back
Posted Oct 7, 2019
Authored by modzero

Whitepaper called Exploits Wars II - The server strikes back.

tags | paper
MD5 | e7773ce3c0c09d5ad85c3ed3e53142ab
Secure Coding To Prevent Some Common Vulnerabilities In Web API .NET
Posted Oct 3, 2019
Authored by Buxu

Whitepaper called Secure coding to prevent some common vulnerabilities (critical/high level) in Web API .NET.

tags | paper, web, vulnerability
MD5 | 90c1d2e9e5066186d95fb8c33dcbc4f0
Practical Decryption exFiltration: Breaking PDF Encryption
Posted Oct 1, 2019
Authored by Christian Mainka, Vladislav Mladenov, Jens Mueller, Jorg Schwenk, Sebastian Schinzel, Fabian Ising

The Portable Document Format, better known as PDF, is one of the most widely used document formats worldwide, and in order to ensure information confidentiality, this file format supports document encryption. In this paper, the authors analyze PDF encryption and show two novel techniques for breaking the confidentiality of encrypted documents.

tags | paper
MD5 | 07a85b3d5850b0d07bc74cd4e5fcc956
Call Your Key To Phone All
Posted Sep 17, 2019
Authored by Gerard Fuguet

This whitepaper discusses acquiring VoIP parameters to take advantage of it and will demonstrate how to extract the password parameter from the provisioning mechanism used by Adamo Telecom Iberia S.A.U.

tags | paper
MD5 | 55d42ea067024fa86e0c68738242b503
Jenkins Groovy Scripts For Red Teamers And Penetration Testers
Posted Sep 10, 2019
Authored by Marco Ortisi, Ahmad Mahfouz

Whitepaper called Jenkins Groovy Scripts for Red Teamers and Penetration Testers.

tags | paper
MD5 | 37a4c513241b8f6c389c5c1cf75a2452
Optimization Method For The Exploitation Times Of Blind SQL Injections
Posted Sep 9, 2019
Authored by Carlos E. Lopez

Whitepaper called Optimization Method For The Exploitation Times of Blind SQL injections.

tags | paper, sql injection
MD5 | 2421682cec87eac02fe702e1cfc969af
Deep Dive Into .NET Malwares
Posted Sep 6, 2019
Authored by Sudeep Singh

This whitepaper provides an in-depth deep dive analysis into .NET malware.

tags | paper
MD5 | 48defef9492f0c5d095d6ecec56c6756
ZeroNights 2019 Call For Papers
Posted Sep 3, 2019
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2019 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia November 12th through the 13th, 2019.

tags | paper, conference
MD5 | f92f44b00e3803c85b3c8c0764b6b5bd
Exploitation Of Windows CVE-2019-0708 (BlueKeep)
Posted Aug 31, 2019
Authored by Palo Alto Networks

Whitepaper called Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into the Kernel with RDP PDU.

tags | paper, kernel
systems | windows
advisories | CVE-2019-0708
MD5 | 6f462839db6bbcac1333d70c6161be2c
Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
MD5 | 5d95461465519fb5f8b887494aae187a
PHP Web Backdoor Decode
Posted Aug 29, 2019
Authored by Mohammad Ariful Islam

Whitepaper called PHP Web Backdoor Decode. It covers decoding an obfuscated/encoded web backdoor shell, recovering the original source code, and the encrypted password in order to login to the backdoor shell.

tags | paper, web, shell, php
MD5 | 6e344c38af456d4c74436df122f2cf9c
BSidesLisbon 2019 Call For Papers
Posted Aug 24, 2019
Site bsideslisbon.org

BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL.

tags | paper, conference
MD5 | 62258dbe561709971ac43d507871e6dd
No cON Name 2019 Call For Papers
Posted Aug 20, 2019
Site noconname.org

The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019.

tags | paper, conference
MD5 | b8bd894366b8d00bf3e8bf213eeecd1e
REVULN 19Q4 Call For Papers
Posted Aug 15, 2019
Site revuln.com

The Call For Papers has been announced for REVULN 19Q4, an international cyber-security conference taking place December 11th and 12th, 2019 in Hong Kong at the Best Western Plus Hotel Hong Kong.

tags | paper, conference
MD5 | 5898b7cbd5c5f126b61004c0c098becf
Low-Level Reversing Of BLUEKEEP
Posted Aug 14, 2019
Authored by Ricardo Narvaja

This whitepaper discusses low-level reversing of the BLUEKEEP vulnerability.

tags | paper
advisories | CVE-2019-0708
MD5 | 3ab6adf388a7c01a0cc216daf74e1f92
Guide To Red Team Operations
Posted Aug 9, 2019
Authored by Yashika Dhir | Site hackingarticles.in

This is a guide to red teaming operations. It covers the basic questions like what is a red team, differences between red teaming and vulnerability assessments along with advance theory such as how red team engagements are done. Thought processes and legal processes are also covered.

tags | paper
MD5 | c25427974dfcb3544ebd6e303dc10e16
Page 2 of 141

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By