what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 3,759 RSS Feed

Whitepaper Files

Dancho Danchev's Personal Memoir
Posted Aug 17, 2021
Authored by Dancho Danchev

Dancho Danchev wrote a personal 100 page memoir.

tags | paper
SHA-256 | 8768965b892b82131fe72867147c1aa8f5bde8ae1c52f43f5116c6cb6e7afd3f
PIP Vulnerability In Android 11
Posted Aug 16, 2021
Authored by Akshay Sharma, Tanmay Tyagi, Abhinav

This is a whitepaper that gives an overview of the PIP vulnerability in Android 11.

tags | paper
SHA-256 | de30f374a906fe8d9c0d8bb8b7dfebcf0db353f3671a5b1d8f515460f9e6c36d
Attacking Optical Character Recognition System
Posted Aug 16, 2021
Authored by Vishwaraj Bhattrai

Whitepaper called Attacking Optical Character Recognition System.

tags | paper
SHA-256 | 27d4178ceb7a28e6651e0994b57cf6748e06a11feff3bb4601978c419df69e91
Pass-The-Hash Attack Over Named Pipes Against ESET Server Security
Posted Aug 5, 2021
Authored by UNSAFE-INLINE

This article focuses on using the NT hash to execute commands successfully on the target server which includes ESET Server Security and File Security even if the packet inspection settings restrict communication with a few services.

tags | paper
SHA-256 | 73f932909f758032767a6c41c634328ff69c7b2451dec44e6313edfddc0e6afa
Demystifying Nmap Scans At The Packet Level
Posted Jul 30, 2021
Authored by Aditya Srivastava | Site adityasrivastava2762.blogspot.com

This paper contains a step by step detailed walk-through of different nmap scanning techniques and how the nmap traffic looks like in wireshark for each scan. The objective of documenting the paper is to get a better understanding of packets while initiating any nmap scan so that it can help in bypassing firewalls or debugging what went wrong between the source and destination. It can also help in writing basic firewall rules.

tags | paper
SHA-256 | e98eb4f64e115f6a22e5fb658a650a8f88305b65ab9f8584011c81fe80099560
Exploiting PHP_SESSION_UPLOAD_PROGRESS
Posted Jul 27, 2021
Authored by Faisal Alhadlaq

This whitepaper discusses chain session upload progress to remote code execution when taking advantage of local file inclusion.

tags | paper, remote, local, code execution, file inclusion
SHA-256 | 3c9df4f24a784d6c632f742ca3902c18462336b6f1ee4031041e932d800f8a5d
hardwear.io 2021 Netherlands Call For Papers
Posted Jul 23, 2021
Authored by hardwear.io CFP

The call for papers for hardwear.io 2021 in the Netherlands is now open. It will take place October 28th through the 29th, 2021 at NH Hotel Den Haag, The Netherlands.

tags | paper, conference
SHA-256 | 68c8cf7a45d193d9d0d1360a6d987ce1ee4b0018bcef8b1a265a29c1fb7d7a14
Smart Contract Automated Testing Guidelines
Posted Jun 28, 2021
Authored by Loc Phan Van

Whitepaper called Smart Contract Automated Testing Guidelines that provides guidance on automation.

tags | paper
SHA-256 | 2637d58d1c7c59b0e8b57db8f391f84b9a001dcc6d498f48455236de4f4f2d0a
JNLP Injection To Multi-OS Code Execution
Posted Jun 25, 2021
Authored by Ken Pyle

Whitepaper discussing BIZARRELOVETRIANGLE and FULLCLIP - JNLP parameter injection attacks to remote, persistent, multi-os code execution.

tags | paper, remote, code execution
SHA-256 | 0544f59a1e884ac5e4753711797fde21b5db764b310bbdc41f2106aa58ffdef4
Network Pivoting HackerEnv
Posted Jun 18, 2021
Authored by Hejap Zairy Al-Sharif

Brief whitepaper that goes through proxy, ssh, and vpn pivoting during an attack. Written in Arabic.

tags | paper
SHA-256 | a1e855c508e17641d2eb114eced9cbb69be22f676f04484aaf30c490b078784e
node-serialize Remote Code Execution Web Shell
Posted Jun 18, 2021
Authored by Beren Kuday Gorun

Whitepaper called 'node-serialize' Remote Code Execution - Web Shell. Written in Turkish.

tags | paper, remote, web, shell, code execution
SHA-256 | 5258591e002e919f55d52d14edd0cf8d6b32488ebf99fbf4b7583e1a674d53bb
Penetration Testing Web Storage (User Experience)
Posted Jun 17, 2021
Authored by Abdulrahman Abdullah

Whitepaper called Penetration Testing Web Storage (User Experience). Written in Arabic.

tags | paper, web
SHA-256 | ac64e028c271cb652e3c0e80ad58084627611674cb22fcd6bb4a831a7c2fced8
Spoofing Downloaded Filename's Extension In Chromium
Posted Jun 16, 2021
Authored by Vallari Sharma, Archie Midha

This whitepaper illustrates exploitation of an insufficient data validation vulnerability in the Chromium framework.

tags | paper
advisories | CVE-2021-21123
SHA-256 | b518b651332d5b50eee9efb4b357a5e396fada0eba42899f6a54932aabdff483
Smuggling Via Windows Services Display Name - Lateral Movement
Posted Jun 14, 2021
Authored by Lawrence Amer

This research paper explains how to take advantage of windows services, how to mimic display names to deploy malicious beacons or even Meterpreter sessions.

tags | paper
systems | windows
SHA-256 | e1a4a62a90edd81fc9429eb3e16e8be7198bf5bc28a6abec8b729d347a942b26
How To Find WordPress Plugin Vulns
Posted Jun 8, 2021
Authored by WPScan | Site wpscan.com

This e-book gives an overview of how to approach assessing WordPress plugins for vulnerabilities and common vectors of attack.

tags | paper, vulnerability
SHA-256 | e66d1b3feb40251693712a7381b3bf18fb112a40e5a99d570e55530e8cadfbfa
Cracking pi-hole Passwords
Posted Jun 8, 2021
Authored by Salman Asad

This is a research paper that gives an overview of cracking pi-hole password hashes.

tags | paper
SHA-256 | 687155fdc445a42788cc41d3f903e89b54bbc18bb85f359808d45b10b2e51fe3
Truth Of Cross Site Scripting
Posted Jun 7, 2021
Authored by Abishekraghav Murugeashan

Whitepaper called Truth of Cross Site Scripting. It gives an overview of types of cross site scripting and how the attacks are achieved.

tags | paper, xss
SHA-256 | 289402d119429de05aaa98fba905a55adee29689c0309d7affdd2e784a584b23
Windows Win32k Elevation Of Privilege Vulnerability
Posted Jun 4, 2021
Authored by Sheikhar Gautam, Rima Yadav

Whitepaper called Windows Win32k Elevation of Privilege Vulnerability. It details exploitation and an overview of CVE-2021-1732.

tags | paper
systems | windows
advisories | CVE-2021-1732
SHA-256 | a9380503b2a681de62499f1daeafb145966439dc2c08d757cb57d440409aaee2
CMS Made Simple V2.2.13
Posted Jun 4, 2021
Authored by Tanmay Tyagi, Abhinav

Whitepaper giving an overview of a remote code execution vulnerability that exists in CMS Made Simple version 2.2.13.

tags | paper, remote, code execution
advisories | CVE-2020-10682
SHA-256 | e8e543b0e7f3d1f441248d328301c18373431ac24f8ad36bc50bc9bebcac44d8
Heap-Based Overflow Vulnerability In Sudo
Posted Jun 4, 2021
Authored by Akshay Sharma, Yamini Sharma

Whitepaper giving an overview of a heap-based buffer overflow in sudo.

tags | paper, overflow
advisories | CVE-2021-3156
SHA-256 | a3e0235d128111d0eec7f203028bcf0e94013d131d5f35034ead6f7a4c3fc3ec
XAMPP File Overwrite Vulnerability
Posted Jun 3, 2021
Authored by Ravindu Priyankara

This is a whitepaper that details exploitation of the XAMPP file overwrite vulnerability.

tags | paper
SHA-256 | 599c840a9119e2c8108281701779707886926208b2da13457cc0150074c5afdf
Ubuntu OverlayFS Local Privilege Escalation
Posted May 31, 2021
Authored by Chris Wild, Sudhanshu Kumar, Rohit Verma

The document in this archive illustrates using the included proof of concept exploit to achieve root on Ubuntu systems using a flaw in the OverlayFS file system. The exploit itself does not have author attribution as the proof of concept came through SSD Disclosures.

tags | exploit, paper, root, proof of concept
systems | linux, ubuntu
advisories | CVE-2021-3493
SHA-256 | 7380c1055909d23c493abb4f5067d3428e536c6a0041025856be420b9c8732fb
The Game Of Threat Hunting
Posted May 28, 2021
Authored by Akash Sarode

This paper is focused on the various ways in which threat hunting can be performed. It is based on the author's research of semi-automating the entire process by creating a tool based on machine learning and applying analytics.

tags | paper
SHA-256 | 6af7c1449c75828f7976e682efcd001d246afb3c611194a09d283daac934ebe6
ExifTool Djvu Code Execution
Posted May 19, 2021
Authored by Ashutosh Upadhyay

Whitepaper that discusses improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up that allows for arbitrary code execution when parsing a malicious image.

tags | paper, arbitrary, code execution
advisories | CVE-2021-22204
SHA-256 | 0517fcbf4b8f3c300d297bd3f60618a661d06f0ec5760f4909a67a4c5ac00216
CPSIoTSec 2021 Call For Papers
Posted May 14, 2021
Site cpsiotsec.github.io

The Call For Papers has been announced for the 2nd Joint Workshop on CPS and IoT Security and Privacy (CPSIoTSec 2021). It will be held in Seoul, South Korea on November 15, 2021.

tags | paper, conference
SHA-256 | b06d8635ef575b104a9761e12224a79c99747d65270f61cbffee99241b943c7d
Page 5 of 151
Back34567Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    14 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close