exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files

Kerberos: Achieving Command Execution Using Silver Tickets
Posted May 12, 2020
Authored by Haboob Team

Whitepaper called Kerberos: Achieving Command Execution Using Silver Tickets.

tags | paper
SHA-256 | 83cd3b8ff1c0604296dc343f1d6082284f701d9ad005d072d420258dfcc14ab5
Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site irmplc.com

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
SHA-256 | 010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e
ciscoLEAP.txt
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
SHA-256 | f69cb36da7ce0751074bc9234b215e5226463cd4f861e903270e34911dae734e
cracking-sql-passwords.pdf
Posted Jul 10, 2002
Authored by David Litchfield | Site ngssoftware.com

Information on cracking the Microsoft SQL pwdencrypt() hash function which is used to generate SQL hashes.

tags | paper, sql injection
SHA-256 | 5c2b4319be1979dcbd27e7fd3420df3b66d393c7fcb09d4c8682d6c6694cd701
kerbdial.ps
Posted Oct 1, 1999

Designing an Authentication System: A Dialogue in Four Scenes: A "play" in which the characters end up designing an authentication system much like Kerberos Provides an easy-to-understand description of why Kerberos is the way it is.

tags | paper
SHA-256 | 16fe80c2e2de29d853ad40a1310a0473a61da8860453522091e89e3a20ca97c1
kerberos.ps
Posted Oct 1, 1999

Kerberos: An Authentication Service for Open Network Systems: A description of the Kerberos authentication system

tags | paper
SHA-256 | 6368a099d905b089968075a87f72e845d263ed0ee2a25e21ddb465b7b7558a9e
kerblim.ps
Posted Oct 1, 1999

Limitations of the Kerberos Authentication System: A description of some limitations and weaknesses in the Kerberos authentication system.

tags | paper
SHA-256 | b56bc24f8eb0acdda7f968de1e80f956ec7ce19d1301212bbdd564a0672b9a21
kknight.ps
Posted Oct 1, 1999

KryptoKnight Authentication and Key Distribution System: An authentication and key distribution system that provides facilities for secure communication in any type of network environment

tags | paper
SHA-256 | 5239521a40929028d5693e30df4f661a3e4fdffce637545fb696a359735a47a8
longjobs.ps
Posted Oct 1, 1999

Long Running Jobs in an Authenticated Environment: A system for running batch jobs in an environment in which users must have tokens or tickets to run

tags | paper
SHA-256 | 318e02294793e84335a35f7f00564fefb4035d4b30041468148f2ae40d640458
ntn.ps
Posted Oct 1, 1999

A Note on the Use of Timestamps as Nonces: A note on the use of timestamps in authentication protocols

tags | paper, protocol
SHA-256 | e6f85f06e87a1bb205c6bb6687f1311cc7f5a4333ecb8efea64805dae8cacb28
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close