exploit the possibilities
Showing 101 - 125 of 3,603 RSS Feed

Whitepaper Files

SCADA Modbus Vulns
Posted Feb 24, 2020
Authored by Harun Seker

Whitepaper called SCADA Modbus Vulns. Written in Turkish.

tags | paper
MD5 | 7c3d4bd58f440e5f3e5909bf1e1312d1
WordPress Security
Posted Feb 21, 2020
Authored by Haktan Emik

Whitepaper called WordPress Security. Written in Turkish.

tags | paper
MD5 | f630a271d334c2aca061b30768228934
Penetration Testing Labs
Posted Feb 20, 2020
Authored by Tolga Kizilkaya

This whitepaper is called Penetration Testing Labs. Written in Turkish.

tags | paper
MD5 | 67479a3ab927f091dbaab48acfc5924e
Understanding MQTT And CoAP Protocols
Posted Feb 20, 2020
Authored by Tarun Bareja

Whitepaper called Understanding MQTT and CoAP Protocols.

tags | paper, protocol
MD5 | e284f661cebc37ca3be1436a3f4ce711
Android Pentest Tutorial Step By Step
Posted Feb 20, 2020
Authored by Meisam Monsef

Whitepaper called Android Pentest Tutorial Step By Step. Written in Persian.

tags | paper
MD5 | 23d6e17529f94a8d40e38dc01684d806
MQTT Protocol Overview
Posted Feb 19, 2020
Authored by Kunal Bharti

This whitepaper provides an overview of the MQTT protocol. MQTT is a is an open OASIS and ISO standard (ISO/IEC PRF 20922) lightweight, simple machine to machine TCP/IP based protocol which can be used for communication between IoT devices.

tags | paper, tcp, protocol
MD5 | e95a8a5bfa307e3c6ccbf6b1426de529
Nmap Scanning - Getting Started
Posted Feb 19, 2020
Authored by Anmol K Sachan

This whitepaper goes over the basics of portscanning and how to use nmap.

tags | paper
MD5 | 408a17ba924f0188db7a9dc1bf918045
Unexplored Warfare Of 21st Century
Posted Feb 17, 2020
Authored by Monika Arora, Esha Chadha, Kartik Verma

Whitepaper called Unexplored Warfare of 21st Century. It analyzes Pegasus and Chrysaor.

tags | paper
MD5 | 33db79693b0c5b565e2219483dc8c09a
Web Application Firewall Bypass Via Bluecoat Device
Posted Feb 17, 2020
Authored by redtimmysec

Whitepaper called Web Application Firewall Bypass via Bluecoat Device.

tags | paper, web
MD5 | 8188e75fa2146b581bd080778464328c
Collecting The Data From Volatile Memory In Digital Forensics
Posted Feb 17, 2020
Authored by Khushank Raj Mahawan

Whitepaper called Collecting the Data from Volatile Memory in Digital Forensics.

tags | paper
MD5 | 1f11de719ced61b37f246d41edf92fca
Hypervisor Necromancy - Reanimating Kernel Protectors
Posted Feb 15, 2020
Authored by phrack, Aris Thallas

Whitepaper called Hypervisor Necromancy - Reanimating Kernel Protectors.

tags | paper, kernel
MD5 | fed9693bce3cb6739d0226ae3503c6da
The R.A.T In The Shell
Posted Feb 14, 2020
Authored by Pradyumn Khanchandani, Siddharth Balyan, Monika Arora

This whitepaper is an analysis of the breach into the Kudankulam Nuclear Power Plant through the lens of Cyber Kill Chain, the study of remote access trojans, and the targeting of critical infrastructure.

tags | paper, remote, trojan
MD5 | c9ed98dbcbf5c0a3dfbec128ccf74d1b
HTTP DoS / DDoS Tools User Manual
Posted Feb 14, 2020
Authored by Merve Latife Say

This whitepaper acts as a user manual to go over HTTP DoS and DDoS tooling. Written in Turkish.

tags | paper, web, denial of service
MD5 | d150e08fa6ec2e09d8267192579b4de1
Packet Sniffer To Sniff Sensitive Credentials Only
Posted Feb 13, 2020
Authored by Roshan Poudel

Whitepaper called Packet Sniffer to Sniff Sensitive Credentials Only.

tags | paper
MD5 | fccb94cbfba25dc0528f289cc32f6721
Apache2 Web Server Hardening Article
Posted Feb 10, 2020
Authored by Kadir Yapar

This is an article discussing Apache2 Web Server hardening. Written in Turkish.

tags | paper, web, conference
MD5 | 714af65b9e8c39a13763f187340761c8
Bsides Brussels 2020 Call For Papers
Posted Feb 7, 2020
Authored by BSides Brussels | Site bsidesbrussels.org

BSides Brussels is a security conference in Brussels, Belgium, with talks, workshops and villages. The goal is to strengthen the exchange of knowledge, cooperation, communication, and integration between the different actors active in the IT security industry. We are pleased to announce that the first edition of BSides Brussels will be held on May 28th, 2020.

tags | paper, conference
MD5 | dd37a81441d49edfc36e142b592ed89f
REVULN 20x2 Call For Papers
Posted Feb 3, 2020
Authored by REVULN

REVULN 20x2 is an international conference taking place the June 25th through the 26th, 2020 in St. Paul's Bay (Malta) at the Hotel Santana.

tags | paper, conference
MD5 | 5ff239aa515c6d0b4350aad7cb8f9b47
REVULN 20x1 Call For Papers
Posted Feb 3, 2020
Authored by REVULN

REVULN 20x1 is an international conference taking place the April 28th through the 30th, 2020 in Metro Manila (Philippines) at the RED Hotel Cubao.

tags | paper, conference
MD5 | f056b932638992744402d575aef22452
LeHACK 2020 Call For Papers
Posted Feb 3, 2020
Authored by Le HACK Conference | Site submit.lehack.org

LeHACK 2020 is a yearly rendezvous where hackers and aficionados are meeting with both technical and non-technical talks and workshops about hacking. It is a great place to discover, to learn, to teach and be taught in the magical city of Paris. LeHACK 2020 will be held in La Cite des Sciences et de l'Industire in Paris, France from June 26th through the 27th, 2020.

tags | paper, conference
MD5 | 2fecce4977a35ea552d93179dfb22375
Hunting Process Injection By Windows API Calls
Posted Jan 30, 2020
Authored by Uriel Kosayev, Nir Yehoshua

Whitepaper called Hunting Process Injection By Windows API Calls.

tags | paper
systems | windows
MD5 | d8cdf69a64e4e424c4ea91d7cae8f5b4
Positive Hack Days 10 Call For Papers
Posted Jan 28, 2020
Site phdays.com

Call For Papers for Positive Hack Days 10 which will take place in Moscow, Russia May 13th through the 14th, 2020.

tags | paper, conference
MD5 | cc687333b074bbb77684a5767d01a60a
Bypassing A Null Byte POP/POP/RET Sequence
Posted Dec 25, 2019
Authored by FULLSHADE

This whitepaper covers a new technique that utilizes DLL injection to inject a custom DLL into a running vulnerable process to add a POP POP RET sequence in the scenario that the vulnerable program does not include any null byte free sequences. This is a useful technique to exploit SEH buffer overflow attacks successfully.

tags | paper, overflow
MD5 | bb80127d68605a1a12195a050601b797
Don't Break The Door, The Key Is Under The Doormat
Posted Dec 19, 2019
Authored by Gerard Fuguet

Whitepaper called Don't Break The Door, The Key Is Under The Doormat.

tags | paper
MD5 | c9dc48f0955811c0252b1bea14bb3b59
CarolinaCon 16 Call For Papers
Posted Dec 4, 2019
Site carolinacon.org

The 16th CarolinaCon will be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020.

tags | paper, conference
MD5 | b37b94d4af6cf9d8b21044e849cec135
BSidesLjubljana 2020 Call For Papers
Posted Nov 27, 2019
Site bsidesljubljana.si

B-Sides Ljubljana will be held April 4th, 2020 in Ljubljana, Slovenia.

tags | paper, conference
MD5 | cc75508f174a9d80d3f5e405effe1cc7
Page 5 of 145
Back34567Next

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    10 Files
  • 22
    Jan 22nd
    16 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close