exploit the possibilities
Showing 26 - 50 of 3,564 RSS Feed

Whitepaper Files

Detect SQL Injection WordPress Plugin Using RegEx
Posted Jun 16, 2020
Authored by SunCSR

Whitepaper called Detect SQL Injection WordPress Plugin using RegEx.

tags | paper, sql injection
MD5 | 2f1d697338aa6cf05465453dbe6e9a2a
Abusing Windows Data Protection API
Posted Jun 16, 2020
Authored by Haboob Team

Whitepaper called Abusing Windows Data Protection API.

tags | paper
systems | windows
MD5 | eee4d970a48308caa8af0670aeea2989
IOT Firmware Analysis
Posted Jun 9, 2020
Authored by Isha Gupta

Whitepaper called IOT Firmware Analysis that walks through extraction and analysis.

tags | paper
MD5 | 8c3ce69d6e5de0e141fc6ab5c75b639b
Exploiting Unrestricted File Upload Via Plugin Uploader In WordPress
Posted Jun 9, 2020
Authored by Isha Gupta

Whitepaper called Exploiting Unrestricted File Upload via Plugin Uploader in WordPress.

tags | paper, file upload
MD5 | 82ef663315bfdc3aa371270f39bd15b1
Buffer Overflow Quick Guide
Posted Jun 8, 2020
Authored by Poseidon-ng

This is a brief whitepaper that discusses buffer overflows and analysis with the Immunity Debugger.

tags | paper, overflow
MD5 | 8f7fc3fa0d5d5b5b815394c941ee52df
Sniffing VoIP Calls Using A Raspberry Pi
Posted Jun 8, 2020
Authored by Vighnesh Raje

Whitepaper called Sniffing VoIP Calls Using A Raspberry Pi.

tags | paper
MD5 | 3d4d27e9ddfa3b45d681209a09acbc0b
OAuth 2.0 Implementation And Security
Posted May 21, 2020
Authored by Haboob Team

Whitepaper called OAuth 2.0 Implementation and Security.

tags | paper
MD5 | a294cb726f90f642c711278a697e63d8
Hunting Red Team Activities With Forensics Artifacts
Posted May 21, 2020
Authored by Haboob Team

Whitepaper called Hunting Red Team Activities with Forensics Artifacts.

tags | paper
MD5 | 052010f0eb75a3b84fd5b85efbeb2cbb
Kerberos: Achieving Command Execution Using Silver Tickets
Posted May 12, 2020
Authored by Haboob Team

Whitepaper called Kerberos: Achieving Command Execution Using Silver Tickets.

tags | paper
MD5 | b6af3918f35480e03b99a605d40c2ec1
Blind CreateRemoteThread Privilege Escalation
Posted May 4, 2020
Authored by petri

Whitepaper called Blind CreateRemoteThread Privilege Escalation.

tags | paper
MD5 | f2ae35b6d0134df40c8af021bb141e40
Bypassing Root Detection Mechanism
Posted May 1, 2020
Authored by Mohammadreza Teymuri

Whitepaper called Bypassing Root Detection Mechanism. Written in Persian.

tags | paper, root
MD5 | e02e9560473dddb6925850b19b152d3b
Exploiting CAN-Bus Using Instrument Cluster Simulator
Posted Apr 15, 2020
Authored by Anjali Prakash

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.

tags | paper
MD5 | ea95d8c2ce4151c44d8dae29b04bfcd2
Azure Cloud Penetration Testing
Posted Apr 10, 2020
Authored by Haboob Team

Whitepaper called Azure Cloud Penetration Testing.

tags | paper
MD5 | 48e67e2b65632432bba8e735f1d5fce5
Centreon 19.10-3.el7 SQL Injection
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.

tags | exploit, paper, remote, vulnerability, sql injection
MD5 | dbac0cf531ae47db48c0dc6c68b92930
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, vulnerability, code execution
MD5 | abc6efe48f42679d3df8d10a4ab60e49
ManageEngine 14 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.

tags | exploit, paper, remote, vulnerability, code execution
MD5 | 361d79554df5c1c70d3bd1a4ab11c9d7
NagiosXI 5.6.11 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.

tags | exploit, paper, remote, vulnerability, proof of concept
MD5 | 73a519ae9906fa675e36f00d2ae34802
Symantec Web Gateway 5.0.2.8 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, proof of concept
MD5 | e3a2193e793902cf582aa14cc8f1a1ee
NagiosXI 5.6 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.

tags | exploit, paper, remote, proof of concept
MD5 | af4fa3179a109a0ef5f00713c259a926
Active Directory DCSync
Posted Apr 6, 2020
Authored by Haboob Team

This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.

tags | paper
MD5 | 360035b1cfe528f9ba2b3eab8d471d54
From Zero Credentials To Full Domain Compromise
Posted Apr 3, 2020
Authored by Haboob Team

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.

tags | paper
MD5 | 1ff5ec3e70d3db856604bdc2d5d41811
Pentesting Zen Load Balancer
Posted Mar 30, 2020
Authored by Cody Sixteen

This whitepaper is a quick tutorial on pentesting the Zen load balancer.

tags | paper
MD5 | 861099cc2be81725b83792a18b56b14b
Hackers 2 Hackers Conference 17th Edition Call For Papers
Posted Mar 25, 2020
Site h2hc.com.br

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.

tags | paper, conference
MD5 | cd42553b9229b45da6f62dde46c6a14c
Solving Computer Forensic Case Using Autopsy
Posted Mar 25, 2020
Authored by Qais Hussainy

Whitepaper called Solving Computer Forensic Case Using Autopsy.

tags | paper
MD5 | 56e506debf00c6b80cba64557df72297
Imperial College COVID-19 Response Team Report
Posted Mar 21, 2020
Authored by Imperial College | Site imperial.ac.uk

The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks.

tags | paper, virus
MD5 | 92166c6ce72fad6671bfdb1d9f798d0a
Page 2 of 143
Back12345Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close