exploit the possibilities
Showing 51 - 75 of 3,564 RSS Feed

Whitepaper Files

Manually Exploiting Intel AMT
Posted Mar 18, 2020
Authored by Laxita Jain

This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.

tags | paper, web
advisories | CVE-2017-5689
MD5 | 72fd2e7bef5700602d4113b623fb94b5
REVULN 20x3 Call For Papers
Posted Mar 14, 2020
Authored by REVULN

REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.

tags | paper, conference
MD5 | 0d35b01fac4ff5871350daca4973105d
CarolinaCon Has Been Postponed
Posted Mar 14, 2020
Site carolinacon.org

CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.

tags | paper, conference
MD5 | 9358979fa2b1bad8ed2aeef9467c1b7d
Windows User Accounts Penetration Testing
Posted Mar 9, 2020
Authored by Moslem Haghighian

Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.

tags | paper
systems | windows
MD5 | 24202c63017e503036f420cbfc0ea8a1
Skippipe: Skipping The Watermark In Digital Content
Posted Mar 6, 2020
Authored by Gerard Fuguet

Whitepaper called Skippipe: Skipping the watermark in digital content.

tags | paper
MD5 | 234d1d216375fbefceae0f18c9204b27
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
MD5 | cbf9769b6b0bca565ecb0c138d7549e2
Running Encrypted ELF Binaries In Memory
Posted Mar 4, 2020
Authored by Marco Ortisi, redtimmysec

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.

tags | paper
MD5 | 52ec6510fb7651a2bf2d2fba030f87b6
DevSecOps: A Secured Approach
Posted Mar 2, 2020
Authored by Aman Chhabra

Whitepaper called DevSecOps: A Secure Approach.

tags | paper
MD5 | 8bde486fb697b20ebfafa96b68611e5a
Deciphering The SWIFT-DRIDEX Relationship In Bank
Posted Feb 28, 2020
Authored by Monika Arora, Harsh, Achint Basoya

This whitepaper is a study that gives an overview about what methodology a hacker uses to hack into a system, discusses a theft of millions from the central bank of Bangladesh, and more.

tags | paper
MD5 | 3ef7c0115d20d15b6ae83d2c02bfe8bc
The ShellShock Attack
Posted Feb 24, 2020
Authored by Nayan Das

Whitepaper called The Shellshock Attack. It covers all of the required topics for understanding the Shellshock vulnerability. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector and the process of exploitation.

tags | paper, proof of concept
MD5 | 4600ed628f8ef50e450bf87a055b884e
The Network Protocol Cheatsheet
Posted Feb 24, 2020
Authored by Riddhi Suryavanshi

This document is intended for students and security professionals as a quick reference for networking protocols. It covers 50 protocols classified according to the OSI Layer they operate on. The corresponding RFC has been provided to further check for parameters / commands of a particular protocol. From a security perspective, the corresponding attacks / vulnerabilities are also included in this cheatsheet.

tags | paper, vulnerability, protocol
MD5 | 5283f87c171d89b2a5c9d8ddec708942
SCADA Modbus Vulns
Posted Feb 24, 2020
Authored by Harun Seker

Whitepaper called SCADA Modbus Vulns. Written in Turkish.

tags | paper
MD5 | 7c3d4bd58f440e5f3e5909bf1e1312d1
WordPress Security
Posted Feb 21, 2020
Authored by Haktan Emik

Whitepaper called WordPress Security. Written in Turkish.

tags | paper
MD5 | f630a271d334c2aca061b30768228934
Penetration Testing Labs
Posted Feb 20, 2020
Authored by Tolga Kizilkaya

This whitepaper is called Penetration Testing Labs. Written in Turkish.

tags | paper
MD5 | 67479a3ab927f091dbaab48acfc5924e
Understanding MQTT And CoAP Protocols
Posted Feb 20, 2020
Authored by Tarun Bareja

Whitepaper called Understanding MQTT and CoAP Protocols.

tags | paper, protocol
MD5 | e284f661cebc37ca3be1436a3f4ce711
Android Pentest Tutorial Step By Step
Posted Feb 20, 2020
Authored by Meisam Monsef

Whitepaper called Android Pentest Tutorial Step By Step. Written in Persian.

tags | paper
MD5 | 23d6e17529f94a8d40e38dc01684d806
MQTT Protocol Overview
Posted Feb 19, 2020
Authored by Kunal Bharti

This whitepaper provides an overview of the MQTT protocol. MQTT is a is an open OASIS and ISO standard (ISO/IEC PRF 20922) lightweight, simple machine to machine TCP/IP based protocol which can be used for communication between IoT devices.

tags | paper, tcp, protocol
MD5 | e95a8a5bfa307e3c6ccbf6b1426de529
Nmap Scanning - Getting Started
Posted Feb 19, 2020
Authored by Anmol K Sachan

This whitepaper goes over the basics of portscanning and how to use nmap.

tags | paper
MD5 | 408a17ba924f0188db7a9dc1bf918045
Unexplored Warfare Of 21st Century
Posted Feb 17, 2020
Authored by Monika Arora, Esha Chadha, Kartik Verma

Whitepaper called Unexplored Warfare of 21st Century. It analyzes Pegasus and Chrysaor.

tags | paper
MD5 | 33db79693b0c5b565e2219483dc8c09a
Web Application Firewall Bypass Via Bluecoat Device
Posted Feb 17, 2020
Authored by redtimmysec

Whitepaper called Web Application Firewall Bypass via Bluecoat Device.

tags | paper, web
MD5 | 8188e75fa2146b581bd080778464328c
Collecting The Data From Volatile Memory In Digital Forensics
Posted Feb 17, 2020
Authored by Khushank Raj Mahawan

Whitepaper called Collecting the Data from Volatile Memory in Digital Forensics.

tags | paper
MD5 | 1f11de719ced61b37f246d41edf92fca
Hypervisor Necromancy - Reanimating Kernel Protectors
Posted Feb 15, 2020
Authored by phrack, Aris Thallas

Whitepaper called Hypervisor Necromancy - Reanimating Kernel Protectors.

tags | paper, kernel
MD5 | fed9693bce3cb6739d0226ae3503c6da
The R.A.T In The Shell
Posted Feb 14, 2020
Authored by Pradyumn Khanchandani, Siddharth Balyan, Monika Arora

This whitepaper is an analysis of the breach into the Kudankulam Nuclear Power Plant through the lens of Cyber Kill Chain, the study of remote access trojans, and the targeting of critical infrastructure.

tags | paper, remote, trojan
MD5 | c9ed98dbcbf5c0a3dfbec128ccf74d1b
HTTP DoS / DDoS Tools User Manual
Posted Feb 14, 2020
Authored by Merve Latife Say

This whitepaper acts as a user manual to go over HTTP DoS and DDoS tooling. Written in Turkish.

tags | paper, web, denial of service
MD5 | d150e08fa6ec2e09d8267192579b4de1
Packet Sniffer To Sniff Sensitive Credentials Only
Posted Feb 13, 2020
Authored by Roshan Poudel

Whitepaper called Packet Sniffer to Sniff Sensitive Credentials Only.

tags | paper
MD5 | fccb94cbfba25dc0528f289cc32f6721
Page 3 of 143

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By