Whitepaper called Bypassing Root Detection Mechanism. Written in Persian.
e02e9560473dddb6925850b19b152d3b
Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.
ea95d8c2ce4151c44d8dae29b04bfcd2
Whitepaper called Azure Cloud Penetration Testing.
48e67e2b65632432bba8e735f1d5fce5
This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.
dbac0cf531ae47db48c0dc6c68b92930
This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.
abc6efe48f42679d3df8d10a4ab60e49
This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.
361d79554df5c1c70d3bd1a4ab11c9d7
This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.
73a519ae9906fa675e36f00d2ae34802
This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.
e3a2193e793902cf582aa14cc8f1a1ee
This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.
af4fa3179a109a0ef5f00713c259a926
This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.
360035b1cfe528f9ba2b3eab8d471d54
Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.
1ff5ec3e70d3db856604bdc2d5d41811
This whitepaper is a quick tutorial on pentesting the Zen load balancer.
861099cc2be81725b83792a18b56b14b
The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.
cd42553b9229b45da6f62dde46c6a14c
Whitepaper called Solving Computer Forensic Case Using Autopsy.
56e506debf00c6b80cba64557df72297
The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks.
92166c6ce72fad6671bfdb1d9f798d0a
This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.
72fd2e7bef5700602d4113b623fb94b5
REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.
0d35b01fac4ff5871350daca4973105d
CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.
9358979fa2b1bad8ed2aeef9467c1b7d
Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.
24202c63017e503036f420cbfc0ea8a1
Whitepaper called Skippipe: Skipping the watermark in digital content.
234d1d216375fbefceae0f18c9204b27
This is a brief whitepaper that discusses fuzzing the VIM editor.
cbf9769b6b0bca565ecb0c138d7549e2
Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.
52ec6510fb7651a2bf2d2fba030f87b6
Whitepaper called DevSecOps: A Secure Approach.
8bde486fb697b20ebfafa96b68611e5a
This whitepaper is a study that gives an overview about what methodology a hacker uses to hack into a system, discusses a theft of millions from the central bank of Bangladesh, and more.
3ef7c0115d20d15b6ae83d2c02bfe8bc
Whitepaper called The Shellshock Attack. It covers all of the required topics for understanding the Shellshock vulnerability. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector and the process of exploitation.
4600ed628f8ef50e450bf87a055b884e