exploit the possibilities
Showing 76 - 100 of 3,604 RSS Feed

Whitepaper Files

Bypassing Root Detection Mechanism
Posted May 1, 2020
Authored by Mohammadreza Teymuri

Whitepaper called Bypassing Root Detection Mechanism. Written in Persian.

tags | paper, root
MD5 | e02e9560473dddb6925850b19b152d3b
Exploiting CAN-Bus Using Instrument Cluster Simulator
Posted Apr 15, 2020
Authored by Anjali Prakash

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.

tags | paper
MD5 | ea95d8c2ce4151c44d8dae29b04bfcd2
Azure Cloud Penetration Testing
Posted Apr 10, 2020
Authored by Haboob Team

Whitepaper called Azure Cloud Penetration Testing.

tags | paper
MD5 | 48e67e2b65632432bba8e735f1d5fce5
Centreon 19.10-3.el7 SQL Injection
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.

tags | exploit, paper, remote, vulnerability, sql injection
MD5 | dbac0cf531ae47db48c0dc6c68b92930
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, vulnerability, code execution
MD5 | abc6efe48f42679d3df8d10a4ab60e49
ManageEngine 14 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.

tags | exploit, paper, remote, vulnerability, code execution
MD5 | 361d79554df5c1c70d3bd1a4ab11c9d7
NagiosXI 5.6.11 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.

tags | exploit, paper, remote, vulnerability, proof of concept
MD5 | 73a519ae9906fa675e36f00d2ae34802
Symantec Web Gateway 5.0.2.8 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, proof of concept
MD5 | e3a2193e793902cf582aa14cc8f1a1ee
NagiosXI 5.6 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.

tags | exploit, paper, remote, proof of concept
MD5 | af4fa3179a109a0ef5f00713c259a926
Active Directory DCSync
Posted Apr 6, 2020
Authored by Haboob Team

This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.

tags | paper
MD5 | 360035b1cfe528f9ba2b3eab8d471d54
From Zero Credentials To Full Domain Compromise
Posted Apr 3, 2020
Authored by Haboob Team

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.

tags | paper
MD5 | 1ff5ec3e70d3db856604bdc2d5d41811
Pentesting Zen Load Balancer
Posted Mar 30, 2020
Authored by Cody Sixteen

This whitepaper is a quick tutorial on pentesting the Zen load balancer.

tags | paper
MD5 | 861099cc2be81725b83792a18b56b14b
Hackers 2 Hackers Conference 17th Edition Call For Papers
Posted Mar 25, 2020
Site h2hc.com.br

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.

tags | paper, conference
MD5 | cd42553b9229b45da6f62dde46c6a14c
Solving Computer Forensic Case Using Autopsy
Posted Mar 25, 2020
Authored by Qais Hussainy

Whitepaper called Solving Computer Forensic Case Using Autopsy.

tags | paper
MD5 | 56e506debf00c6b80cba64557df72297
Imperial College COVID-19 Response Team Report
Posted Mar 21, 2020
Authored by Imperial College | Site imperial.ac.uk

The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks.

tags | paper, virus
MD5 | 92166c6ce72fad6671bfdb1d9f798d0a
Manually Exploiting Intel AMT
Posted Mar 18, 2020
Authored by Laxita Jain

This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.

tags | paper, web
advisories | CVE-2017-5689
MD5 | 72fd2e7bef5700602d4113b623fb94b5
REVULN 20x3 Call For Papers
Posted Mar 14, 2020
Authored by REVULN

REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.

tags | paper, conference
MD5 | 0d35b01fac4ff5871350daca4973105d
CarolinaCon Has Been Postponed
Posted Mar 14, 2020
Site carolinacon.org

CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.

tags | paper, conference
MD5 | 9358979fa2b1bad8ed2aeef9467c1b7d
Windows User Accounts Penetration Testing
Posted Mar 9, 2020
Authored by Moslem Haghighian

Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.

tags | paper
systems | windows
MD5 | 24202c63017e503036f420cbfc0ea8a1
Skippipe: Skipping The Watermark In Digital Content
Posted Mar 6, 2020
Authored by Gerard Fuguet

Whitepaper called Skippipe: Skipping the watermark in digital content.

tags | paper
MD5 | 234d1d216375fbefceae0f18c9204b27
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
MD5 | cbf9769b6b0bca565ecb0c138d7549e2
Running Encrypted ELF Binaries In Memory
Posted Mar 4, 2020
Authored by Marco Ortisi, redtimmysec

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.

tags | paper
MD5 | 52ec6510fb7651a2bf2d2fba030f87b6
DevSecOps: A Secured Approach
Posted Mar 2, 2020
Authored by Aman Chhabra

Whitepaper called DevSecOps: A Secure Approach.

tags | paper
MD5 | 8bde486fb697b20ebfafa96b68611e5a
Deciphering The SWIFT-DRIDEX Relationship In Bank
Posted Feb 28, 2020
Authored by Monika Arora, Harsh, Achint Basoya

This whitepaper is a study that gives an overview about what methodology a hacker uses to hack into a system, discusses a theft of millions from the central bank of Bangladesh, and more.

tags | paper
MD5 | 3ef7c0115d20d15b6ae83d2c02bfe8bc
The ShellShock Attack
Posted Feb 24, 2020
Authored by Nayan Das

Whitepaper called The Shellshock Attack. It covers all of the required topics for understanding the Shellshock vulnerability. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector and the process of exploitation.

tags | paper, proof of concept
MD5 | 4600ed628f8ef50e450bf87a055b884e
Page 4 of 145
Back23456Next

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    10 Files
  • 22
    Jan 22nd
    16 Files
  • 23
    Jan 23rd
    1 Files
  • 24
    Jan 24th
    1 Files
  • 25
    Jan 25th
    28 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close