Twenty Year Anniversary
Showing 101 - 125 of 3,349 RSS Feed

Whitepaper Files

Analysis Of The Ivyl Sample Kernel Rootkit
Posted Feb 21, 2017
Authored by x90c

This is a whitepaper providing an analysis of the Ivyl sample kernel rootkit. Written in Korean.

tags | paper, kernel
MD5 | 4baeea8a46ff0f645b75fb0fa6a0314f
Injecting SQLite Database-Based Application
Posted Feb 19, 2017
Authored by Manish Tanwar

This is a whitepaper that discusses leveraging SQL injection attacks against SQLite databases.

tags | paper, sql injection
MD5 | 5d5a3664bfa800fd6c41493052b37555
RECON 2017 Call For Papers
Posted Feb 18, 2017
Authored by REC0N Montreal 2017 | Site

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada, and as of this year, a new edition of the conference was held in Brussels, Belgium. The Call For Papers closes on April 15th, 2017. The conference takes place June 16th through June 18th, 2017.

tags | paper, conference
MD5 | 6a89928da827961f971dcb651d5bfb5e
DEF CON 25 Wall Of Sheep Call For Presentations
Posted Feb 14, 2017
Authored by wallofsheep2017

The Wall of Sheep would like to announce a call for presentations at DEF CON 25 at the Caesars Palace in Las Vegas, NV from Thursday, July 27th to Sunday, July 30th. This will be the 5th anniversary of their Speaker Workshops. The Wall of Sheep's workshops goal is to deliver talks that increase security awareness and provide skills that can be immediately applied after the conference. Their audience ranges from those who are new to security to the most seasoned practitioners in the security industry. Introductory talks are welcome.

tags | paper, conference
MD5 | bc181ccc40449f9047e5bdf0f4e4781c
InfoSec 2017 Call For Papers
Posted Feb 10, 2017
Authored by InfoSec17 | Site

The Call For Papers for InfoSec 2017 has been announced. It will be hosted by the Faculty of Management, Comenius University in Bratislava, Slovakia on June 29th through July 1st, 2017.

tags | paper, conference
MD5 | dc21984aa17f26a6f3f9698f5731df0d
Exploiting Node.js Deserialization Bug For Remote Code Execution
Posted Feb 9, 2017
Authored by Ajin Abraham

Whitepaper called Exploiting Node.js Deserialization Bug for Remote Code Execution.

tags | paper, remote, code execution
advisories | CVE-2017-5941
MD5 | e708ac9d98283882b75c7545b17f3579
Amsterdam Technical Colloquium Call For Papers
Posted Feb 6, 2017

The first annual Amsterdam Technical Colloquium (TC) has announced its call for speakers. It will take place in Amsterdam, Netherlands from April 25th through the 26th, 2017.

tags | paper, conference
MD5 | 2b3f96eb8a934bc9de9ee7fd4c4afd50
Extracting Data From UPDATE And INSERT
Posted Feb 4, 2017
Authored by Osanda Malith

The traditional in-band method in INSERT, UPDATE injections would be by fixing the query. For example in INSERT statements one can simply fix the query, comment out the rest and extract the data once it is echoed out by the application. Same goes with the UPDATE statement, but only if the query has more than one column we can fix the query. What if we face a situation where UPDATE or INSERT has one column or simply we don’t know the exact query to fix? What if mysql_error() is not echoed out? This paper discusses how this works in-depth.

tags | paper
MD5 | b7f93b900e475675844e4bcace0d312d
Copenhagen CyberCrime Conference Call For Speakers
Posted Feb 3, 2017

The Copenhagen CyberCrime conference has announced its call for speakers. It will take play May 24th, 2017 in Copenhagen, Denmark.

tags | paper, conference
MD5 | cdeb5980a0d8ff5e59036b4885d4b98e
MySQL OOB Hacking
Posted Jan 29, 2017
Authored by Osanda Malith

This is a paper that discussing MySQL OOB hacking techniques under Windows.

tags | paper
systems | windows
MD5 | f927be9e4e0c76f1ea9267c22544c206
Alternative For Information_Schema.Tables In MySQL
Posted Jan 29, 2017
Authored by Osanda Malith

Brief paper discussing an alternative technique to use instead of 'information_schema.tables' when extracting table names in SQL injections.

tags | paper, sql injection
MD5 | 8e6048a99360f0516cf7cb6a2eae3e08
DigitalSec 2017 Call For Papers
Posted Jan 27, 2017

The DigitalSec 2017 Call For Papers has been announced. It will take place in Kuala Lumpur, Malaysia, on July 11th through the 13th, 2017.

tags | paper, conference
MD5 | 709e9c8bedaf229a0ced89f465ea3278
An Overview Of Some Popular Network Anonymity Systems
Posted Jan 25, 2017
Authored by James Fell

This essay takes a look at a selection of network anonymity systems including VPNs, Tor, Freenet and I2P. The different systems are explained and then compared and contrasted with each other. A number of issues are considered for each system including ease of use, popularity, strength of anonymity provided, and potential attacks on the system.

tags | paper
MD5 | edf4b50c5f22ff22e631de9cd3c9e745
RVAsec 2017 Call For Papers
Posted Jan 23, 2017

RVAsec is a Richmond, VA based security convention that brings top industry speakers to the mid-Atlantic region. It will be held June 8th through the 9th, 2017, in Richmond, VA, USA.

tags | paper, conference
MD5 | 80b48062063b2a0287d165f0855445fc
Telstra 4Gx Portable Router Persistent Root Shell
Posted Jan 22, 2017
Authored by David Crees

This write up discusses how to leave a persistent root shell on a Telstra 4GX portable router.

tags | paper, shell, root
MD5 | 5ce382b3e97db0ed2752e7c22784c2b7
Top N Sniff
Posted Jan 20, 2017

The goal of this guide is to provide a reliable and fast way for creating a lan tap for red team assessments of networks. While this was the authors' main target this tap is also quite helpful if you want to have a great device for your daily analysis of network attached computers. Before they started with their implementation they made a list of things which were mandatory. The hardware had to be small, have at least two lan ports and wifi, cheap and opensource included or available.

tags | paper
MD5 | ac7778ad5599acc94c816cf3ecd6e044
br3aking c0de 2017 Call For Papers
Posted Jan 20, 2017
Authored by Francisco Javier Santiago Vazquez

The Call For Papers for br3aking c0de 2017 has been announced. It will take place April 22nd, 2017 in a currently undisclosed location.

tags | paper, conference
MD5 | 0b7b8fa187248b2b0ab8f1f40ef8d6c7
EuskalHack Security Congress 2017 Call For Papers
Posted Jan 17, 2017

EuskalHack Security Congress is the first Ethical Hacking association in Euskadi, with the aim of promoting the community and culture in digital security to anyone who may be interested. It will be held June 23rd through the 24th, 2017 in Donostia - San Sebastian.

tags | paper, conference
MD5 | 9266366ff5b618000b1cc0dda9fda53e
BSidesLjubljana 2017 Call For Papers
Posted Jan 17, 2017

B-Sides Ljubljana will be held March 10th, 2017 in Ljubljana, Slovenia.

tags | paper, conference
MD5 | 127b13ed28b446a3393e554983712fd4
Cloud Forensics
Posted Jan 14, 2017
Authored by Preet Shah

This is a whitepaper that covers basic cloud computer concepts, forensics, and challenges surrounding investigations.

tags | paper
MD5 | 0e4e3c4a10a0262519bcd94790ec0c7a
Security BSides Las Vegas 2017 Call For Papers
Posted Jan 10, 2017
Authored by BSides LV

BSides Las Vegas 2017 has announced its Call For Papers. It will take place July 25th and 26th, 2017, in Las Vegas, Nevada.

tags | paper, conference
MD5 | e0d37162ebf34dc8a21d061e8ba5e7da
YSTS 11th Edition Call For Papers
Posted Jan 7, 2017

The 11th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 22nd, 2017.

tags | paper, conference
MD5 | 9904a8f5ebc1b782744c1a187218a7ce
CarolinaCon 2017 Call For Papers
Posted Jan 6, 2017

CarolinaCon is now accepting speaker/paper/demo submissions for its 13th annual conference. This event will be held May 19th through the 21st, 2017 in Raleigh, NC, USA.

tags | paper, conference
MD5 | afa65e8d3c99db6a68bf80b910e362bf
Local File Inclusion (LFI) Testing Techniques
Posted Jan 6, 2017
Authored by Aptive | Site

The intent of this document is to help penetration testers and students identify and test LFI vulnerabilities on future penetration testing engagements by consolidating research for local file inclusion LFI penetration testing techniques. LFI vulnerabilities are typically discovered during web app penetration testing using the techniques contained within this document. Additionally, some of the techniques mentioned in this paper are also commonly used in CTF style competitions.

tags | paper, web, local, vulnerability, file inclusion
MD5 | e7fdd5e5b7b65b2027f85f7ec55081ff
GRIZZLY STEPPE - Russian Malicious Cyber Activity
Posted Dec 30, 2016

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.

tags | paper
MD5 | 2ed6f1c47dd865d072a48b1ed97a4f98
Page 5 of 134

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    2 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By