Exploit the possiblities
Showing 76 - 100 of 3,318 RSS Feed

Whitepaper Files

Amsterdam Technical Colloquium Call For Papers
Posted Feb 6, 2017
Site first.org

The first annual Amsterdam Technical Colloquium (TC) has announced its call for speakers. It will take place in Amsterdam, Netherlands from April 25th through the 26th, 2017.

tags | paper, conference
MD5 | 2b3f96eb8a934bc9de9ee7fd4c4afd50
Extracting Data From UPDATE And INSERT
Posted Feb 4, 2017
Authored by Osanda Malith

The traditional in-band method in INSERT, UPDATE injections would be by fixing the query. For example in INSERT statements one can simply fix the query, comment out the rest and extract the data once it is echoed out by the application. Same goes with the UPDATE statement, but only if the query has more than one column we can fix the query. What if we face a situation where UPDATE or INSERT has one column or simply we don’t know the exact query to fix? What if mysql_error() is not echoed out? This paper discusses how this works in-depth.

tags | paper
MD5 | b7f93b900e475675844e4bcace0d312d
Copenhagen CyberCrime Conference Call For Speakers
Posted Feb 3, 2017
Site cyberhagen.com

The Copenhagen CyberCrime conference has announced its call for speakers. It will take play May 24th, 2017 in Copenhagen, Denmark.

tags | paper, conference
MD5 | cdeb5980a0d8ff5e59036b4885d4b98e
MySQL OOB Hacking
Posted Jan 29, 2017
Authored by Osanda Malith

This is a paper that discussing MySQL OOB hacking techniques under Windows.

tags | paper
systems | windows
MD5 | f927be9e4e0c76f1ea9267c22544c206
Alternative For Information_Schema.Tables In MySQL
Posted Jan 29, 2017
Authored by Osanda Malith

Brief paper discussing an alternative technique to use instead of 'information_schema.tables' when extracting table names in SQL injections.

tags | paper, sql injection
MD5 | 8e6048a99360f0516cf7cb6a2eae3e08
DigitalSec 2017 Call For Papers
Posted Jan 27, 2017
Site sdiwc.net

The DigitalSec 2017 Call For Papers has been announced. It will take place in Kuala Lumpur, Malaysia, on July 11th through the 13th, 2017.

tags | paper, conference
MD5 | 709e9c8bedaf229a0ced89f465ea3278
An Overview Of Some Popular Network Anonymity Systems
Posted Jan 25, 2017
Authored by James Fell

This essay takes a look at a selection of network anonymity systems including VPNs, Tor, Freenet and I2P. The different systems are explained and then compared and contrasted with each other. A number of issues are considered for each system including ease of use, popularity, strength of anonymity provided, and potential attacks on the system.

tags | paper
MD5 | edf4b50c5f22ff22e631de9cd3c9e745
RVAsec 2017 Call For Papers
Posted Jan 23, 2017
Site rvasec.com

RVAsec is a Richmond, VA based security convention that brings top industry speakers to the mid-Atlantic region. It will be held June 8th through the 9th, 2017, in Richmond, VA, USA.

tags | paper, conference
MD5 | 80b48062063b2a0287d165f0855445fc
Telstra 4Gx Portable Router Persistent Root Shell
Posted Jan 22, 2017
Authored by David Crees

This write up discusses how to leave a persistent root shell on a Telstra 4GX portable router.

tags | paper, shell, root
MD5 | 5ce382b3e97db0ed2752e7c22784c2b7
Top N Sniff
Posted Jan 20, 2017
Site curesec.com

The goal of this guide is to provide a reliable and fast way for creating a lan tap for red team assessments of networks. While this was the authors' main target this tap is also quite helpful if you want to have a great device for your daily analysis of network attached computers. Before they started with their implementation they made a list of things which were mandatory. The hardware had to be small, have at least two lan ports and wifi, cheap and opensource included or available.

tags | paper
MD5 | ac7778ad5599acc94c816cf3ecd6e044
br3aking c0de 2017 Call For Papers
Posted Jan 20, 2017
Authored by Francisco Javier Santiago Vazquez

The Call For Papers for br3aking c0de 2017 has been announced. It will take place April 22nd, 2017 in a currently undisclosed location.

tags | paper, conference
MD5 | 0b7b8fa187248b2b0ab8f1f40ef8d6c7
EuskalHack Security Congress 2017 Call For Papers
Posted Jan 17, 2017
Site euskalhack.org

EuskalHack Security Congress is the first Ethical Hacking association in Euskadi, with the aim of promoting the community and culture in digital security to anyone who may be interested. It will be held June 23rd through the 24th, 2017 in Donostia - San Sebastian.

tags | paper, conference
MD5 | 9266366ff5b618000b1cc0dda9fda53e
BSidesLjubljana 2017 Call For Papers
Posted Jan 17, 2017
Site bsidesljubljana.si

B-Sides Ljubljana will be held March 10th, 2017 in Ljubljana, Slovenia.

tags | paper, conference
MD5 | 127b13ed28b446a3393e554983712fd4
Cloud Forensics
Posted Jan 14, 2017
Authored by Preet Shah

This is a whitepaper that covers basic cloud computer concepts, forensics, and challenges surrounding investigations.

tags | paper
MD5 | 0e4e3c4a10a0262519bcd94790ec0c7a
Security BSides Las Vegas 2017 Call For Papers
Posted Jan 10, 2017
Authored by BSides LV

BSides Las Vegas 2017 has announced its Call For Papers. It will take place July 25th and 26th, 2017, in Las Vegas, Nevada.

tags | paper, conference
MD5 | e0d37162ebf34dc8a21d061e8ba5e7da
YSTS 11th Edition Call For Papers
Posted Jan 7, 2017
Site ysts.org

The 11th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 22nd, 2017.

tags | paper, conference
MD5 | 9904a8f5ebc1b782744c1a187218a7ce
CarolinaCon 2017 Call For Papers
Posted Jan 6, 2017
Site carolinacon.org

CarolinaCon is now accepting speaker/paper/demo submissions for its 13th annual conference. This event will be held May 19th through the 21st, 2017 in Raleigh, NC, USA.

tags | paper, conference
MD5 | afa65e8d3c99db6a68bf80b910e362bf
Local File Inclusion (LFI) Testing Techniques
Posted Jan 6, 2017
Authored by Aptive | Site aptive.co.uk

The intent of this document is to help penetration testers and students identify and test LFI vulnerabilities on future penetration testing engagements by consolidating research for local file inclusion LFI penetration testing techniques. LFI vulnerabilities are typically discovered during web app penetration testing using the techniques contained within this document. Additionally, some of the techniques mentioned in this paper are also commonly used in CTF style competitions.

tags | paper, web, local, vulnerability, file inclusion
MD5 | e7fdd5e5b7b65b2027f85f7ec55081ff
GRIZZLY STEPPE - Russian Malicious Cyber Activity
Posted Dec 30, 2016
Site us-cert.gov

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.

tags | paper
MD5 | 2ed6f1c47dd865d072a48b1ed97a4f98
Pozzo And Lucky, The Phantom Shell. Stego In TCP/IP Part 2
Posted Dec 12, 2016
Authored by John Torakis

Whitepaper called Pozzo and Lucky, The phantom Shell. Stego in TCP/IP Part 2.

tags | paper, shell, tcp
MD5 | a6c9bb01e06dadec12c647c00cd97767
Art Of Anti Detection - Introduction To AV And Detection Techniques
Posted Dec 11, 2016
Authored by Ege Balci

Whitepaper called Art Of Anti Detection - Introduction To AV And Detection Techniques.

tags | paper
MD5 | 9eae0d293e376a1e0306cda3a5ac06e9
Teaching An Old Dog (Not That New) Tricks - Stego In TCP/IP Made Easy Part 1
Posted Dec 8, 2016
Authored by John Torakis

Whitepaper called Teaching an Old Dog (not that new) Tricks - Stego in TCP/IP made easy (part-1).

tags | paper, tcp
MD5 | 960ed71aa5f4b8c8ae9fbfcff0bbc475
31c0n Call For Papers
Posted Dec 6, 2016
Authored by 31c0n

31c0n has announced its call for papers. It will take place February 23rd through the 24th, 2017 in Auckland, New Zealand.

tags | paper, conference
MD5 | 3d5a4bd82124073d666de32126909794
NorthSec 2017 Call For Papers
Posted Dec 2, 2016
Site nsec.io

NorthSec 2017 has announced its Call For Papers. It will be held in Montreal, Canada, from May 16th through the 21st, 2017.

tags | paper, conference
MD5 | eecfdaa85de8cd79bbce83a474d4d29d
Nuit Du Hack 2017 Call For Papers
Posted Nov 29, 2016
Authored by Nuit Du Hack

The Nuit Du Hack Call For Papers for 2017 has been announced. It will be held June 24th through the 25th, 2017 in Paris, France.

tags | paper, conference
MD5 | 0a4cd7ad44964e211e56f0d4e1a07931
Page 4 of 133
Back23456Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close