what you don't know can hurt you
Showing 101 - 125 of 3,533 RSS Feed

Whitepaper Files

c0c0n 2019 Call For Papers
Posted Apr 5, 2019
Site is-ra.org

The c0c0n 2019 call for papers has been announced. It will take place September 25th through the 28th, 2019 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
MD5 | 7249c0266d14ba00f16c8728632d4033
RECON 2019 Call For Papers
Posted Mar 26, 2019
Authored by REC0N Montreal 2019 | Site recon.cx

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It will be held June 28th through the 30th, 2019, in Montreal, Canada.

tags | paper, conference
MD5 | 20b57c81c732a0f0d02f1daae7178ad4
JMX RMI - Multiple Applications RCE
Posted Mar 26, 2019
Authored by redtimmysec

This whitepaper discusses highlights of findings related to remote code execution leveraging JMX/RMI.

tags | paper, remote, code execution
advisories | CVE-2018-11247, CVE-2018-8016, CVE-2019-7727
MD5 | 6ff134ecb65e85ce3c03348a2f8cc3e1
Microsoft Windows Binary Planting
Posted Mar 18, 2019
Authored by Frederic Bourla

This is a short write-up on binary planting along with a few old-school 0-days which may still be helpful for pentesters willing to escalate privileges on Windows.

tags | paper
systems | windows
MD5 | 2610f1f8b017ac3a538d7e379b554592
IPv6 Security For IPv4 Engineers
Posted Mar 14, 2019
Authored by Fernando Gont

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as much of the existing IPv4 knowledge and experience as possible. It highlights the security issues that affect both protocols in the same manner, as well as those that are new or different for the IPv6 protocol suite. Additionally, it discusses the security implications arising from the co-existence of the IPv6 and IPv4 protocols.

tags | paper, protocol
MD5 | 3c7ad3f60f63c849f9bff9b85784a99a
How Do You Use An XSS As A Keylogger?
Posted Mar 10, 2019
Authored by Ismail Tasdelen

This is the world's shortest whitepaper showing how to use javascript to record keystrokes and log them.

tags | paper, javascript
MD5 | 7b93299171e5f7b4226507db4f42a273
Flexpaper 2.3.6 Remote Code Execution
Posted Mar 8, 2019
Authored by Marco Ortisi

Whitepaper discussing Flexpaper versions 2.3.6 and below which suffer from a remote code execution vulnerability.

tags | exploit, paper, remote, code execution
MD5 | 331487287912b9a46dcc93be2d9569a4
File Transfer Skills In The Red Team Post Penetration Test
Posted Mar 7, 2019
Authored by xax007

Whitepaper called File transfer skills in the red team post penetration test.

tags | paper
MD5 | 9afe5f91a9c54df50eebf28e7275df4e
SPOILER: Speculative Load Hazards Boost Rowhammer And Cache Attacks
Posted Mar 7, 2019
Authored by Ahmad Moghimi, Moritz Krebbel, Saad Islam, Berk Sunar, Berk Gulmezoglu, Thomas Eisenbarth, Ida Bruhns

Whitepaper called SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. This research was produced jointly between Worcester Polytechnic Institute and University of Lubeck. It has been noted that software mitigations tied to Spectre will not mitigate this newly identified issue.

tags | paper
MD5 | b6ba3b01a09c79386f413c930ccf0a61
Android Securty Research: Crypto Local Storage Attack
Posted Feb 28, 2019
Authored by Viet Nguyen Quoc, Loc Phan Van

Whitepaper called Android Security Research: Crypto Wallet Local Storage Attack.

tags | paper, local, crypto
MD5 | 302db448f5da580da34910a16f859d5b
PDF Viewer Signatures Broken
Posted Feb 26, 2019
Authored by Christian Mainka, Vladislav Mladenov, Jorg Schwenk, Karsten Meyer zu Sel-hausen, Martin Grothe | Site nds.ruhr-uni-bochum.de

Researchers from Ruhr-University Bochum in Germany have broken digital signatures on PDFs and managed to create fake signatures on 21 of 22 viewer apps and five out of the seven online PDF digital signing services. This archive contains both whitepapers produced by the university.

tags | exploit, paper
MD5 | fe2c0d914302043ea609a1f2e70944c5
Subdomain Takeover
Posted Feb 19, 2019
Authored by InitD Community

Whitepaper called The Ultimate Guide for Basic Subdomain Takeover with Practical.

tags | paper
MD5 | 0dfb73cde67c722ec8d25eae0791865f
Remote Code Execution With EL Injection Vulnerabiltiies
Posted Feb 1, 2019
Authored by Asif Durani

This paper discusses a vulnerability class called "Expression Language Injection (EL Injection)". Although several security researchers have published details in the past, the bug class is still fairly unknown. EL Injection is a serious security threat over the Internet for the various dynamic applications. In today's world, there is a universal need present for dynamic applications. As the use of dynamic applications for various online services is rising, so is the security threats increasing. This paper defines a methodology for detecting and exploiting EL injection.

tags | paper
MD5 | d27631ed77a06533d0b790da76f33b03
RVAsec 2019 Call For Papers
Posted Jan 24, 2019
Site rvasec.com

RVAsec is a Richmond, VA based security convention that brings top industry speakers to the Mid-Atlantic region. In its seventh year, RVAsec 2018 attracted over 650 security professionals from across the country. For 2019, the conference is a two day and three track format, with a mixed focus on technical and management/business presentations. It will take place May 22nd through the 23rd, 2019 in Richmond, VA, USA.

tags | paper, conference
MD5 | 729ff0d02d949fb47e5664b6d7c931d1
LeHACK 2019 Call For Papers
Posted Jan 22, 2019
Authored by Le HACK Conference | Site submit.lehack.org

LeHACK 2019 is a yearly rendezvous where hackers and aficionados are meeting around with both technical and non-technical talks and workshops about hacking. It is a great place to discover, to learn, to teach and be taught in the magical city of Paris. LeHACK 2019 will be held in La Cite des Sciences, Paris (France) on the 6th and 7th of July 2019.

tags | paper, conference
MD5 | fccf9e109abe82f3169baa51170c3a61
Positive Hack Days 9 Call For Papers
Posted Jan 21, 2019
Site phdays.com

Call For Papers for Positive Hack Days 9 which will take place in Moscow, Russia.

tags | paper, conference
MD5 | 3e627c51705d3552b7565be7b1d0603e
Windows Debugging 101
Posted Jan 17, 2019
Authored by Ialle Teixeira

Whitepaper called Windows Debugging 101. Written in Portuguese.

tags | paper
systems | windows
MD5 | f6aed0ddc09c84c5c00bbef67d3c2fa6
EuskalHack Security Congress IV Call For Papers
Posted Jan 16, 2019
Site euskalhack.org

EuskalHack Security Congress Fourth Edition is a new proposal from the EuskalHack Computer Security Association, with the aim to promote the community growth and the culture in the digital security field. As usual, in this new edition proximity to our public and technical quality will be our hallmarks. This exclusive conference is shaping up as the most relevant in Basque Country, with an estimated 180 attendees for this fourth edition. The participants include specialized companies, state security organizations, professionals, hobbyists and students in the area of security and Information Technology. The date for the conference is the 21st and 22nd of June 2019 in the lovely city of Donostia, San Sebastian.

tags | paper, conference
MD5 | 3cc4750bb9181d991e4016eefb223b28
Windows Privilege Escalation
Posted Jan 14, 2019
Authored by Haboob Team

Whitepaper called Windows Privilege Escalation.

tags | paper
systems | windows
MD5 | 1ee7e7e4abde2c7223d25de4e533d2af
Reverse Engineering 101 Using Radare2
Posted Jan 14, 2019
Authored by Ialle Teixeira

Whitepaper called Reverse Engineering 101 use Radare2.

tags | paper
MD5 | cb599d7ad9af401cb27f5df3496ef3dc
How To Exploit PHP Remotely To Bypass Filters And WAF Rules
Posted Dec 25, 2018
Authored by themiddleblue

Whitepaper called How to Exploit PHP Remotely to Bypass Filters and WAF Rules.

tags | paper, php
MD5 | 951bbbe0ecb41f1c347de656c6715e7e
REVULN 19 Call For Papers
Posted Dec 24, 2018
Site revuln.com

REVULN 19 is an information technology security conference taking place on May 15th, 2019 in Hong Kong at the Harbour Plaza North Point Hotel.

tags | paper, conference
MD5 | cfe0efe2b6f87c7ffa0bb50667e66182
Trivial MD5 Collision
Posted Dec 23, 2018
Authored by corkami

Whitepaper detailing how getting an MD5 collision of two images is now(*) trivial and instant.

tags | paper
MD5 | f271bf5268ae5b7f7795f9180bd46634
Auditing Microsoft Domain Environment
Posted Dec 20, 2018
Authored by Engin Demirbilek

Whitepaper called Auditing Microsoft Domain Environment.

tags | paper
MD5 | 07819284bb17e61b2cca36896160d64e
YSTS 2019 Call For Papers
Posted Dec 14, 2018
Site ysts.org

The 2019 edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 27th, 2019.

tags | paper, conference
MD5 | 75a1bf4ec5ccd055d7d3405ca476328e
Page 5 of 142

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    15 Files
  • 4
    Jun 4th
    25 Files
  • 5
    Jun 5th
    8 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By