Exploit the possiblities
Showing 1 - 25 of 79 RSS Feed

Files

Evading All Web-Application Firewalls XSS Filters
Posted Sep 9, 2015
Authored by Mazin Ahmed

This whitepaper documents shortcomings in various popular web application firewalls (WAFS) and how to trigger cross site scripting attacks regardless of the protections in place. Covered are F5 Big IP, Imperva Incapsula, AQTRONIX WebKnight, PHP-IDS, Mod-Security, Sucuri, QuickDefense, and Barracuda WAF.

tags | paper, web, xss
MD5 | 1cbaf237965d673f4610dd022d5eb934
How To Bypass SafeSEH And Stack Cookie Protection
Posted Dec 4, 2014
Authored by Bekir Karul

Whitepaper called How to Bypass SafeSEH and Stack Cookie Protection. Written in Turkish.

tags | paper
MD5 | a81b3008c1f4f90df142d1dc6cb1905c
WAF Bypass Methods
Posted Apr 29, 2014
Authored by Deniz Cevik

This whitepaper discusses various web application firewall bypass methodologies. Written in Turkish.

tags | paper, web, bypass
MD5 | 5db5d21ca8c94c8eaa853979e51138b4
Clamwin Antivirus Bypass Methodology
Posted Feb 17, 2014
Authored by Freebyte

This is a whitepaper discussing the bypassing of Clamwin Antivirus. Written in Azerbaijan.

tags | paper, bypass
MD5 | bc2e8d077733bf8e8632f4cc642685a0
Bypassing Modern Web Application Firewalls
Posted Dec 14, 2013
Authored by Rafay Baloch

This whitepaper is called Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters.

tags | paper, web
MD5 | 929bd2711e1c79a08e4a6c59381ac3ec
Bypass Comodo Firewall
Posted Nov 16, 2012
Authored by W1ckerMan

This whitepaper discusses bypassing the Comodo firewall using port redirection. Written in Portuguese.

tags | paper
MD5 | e6da7f091b8394fd9de57fbf9a282519
Bypassing Avast Sandbox Using Alternate Data Streaming
Posted Oct 28, 2012
Authored by W1ckerMan

This is a brief whitepaper detailing how to bypass the Avast! sandbox using alternate data streaming.

tags | paper
MD5 | 1c3c22c2705fc199b1b797ffe32c462d
Bypassing Spam Filters Using Homographs
Posted Jul 30, 2012
Authored by Fady Mohamed Osman

This is a whitepaper called Bypassing Spam Filter Using Homographs. Some generation code is also included.

tags | paper
systems | linux
MD5 | 9395f5bee432162375e37981ac30a2ac
Bypassing Address Space Layout Randomization
Posted Apr 16, 2012
Authored by TheXero | Site nullsecurity.net

Most modern day Operating Systems include some form of memory protection such as DEP and ASLR. This article focuses on ASLR, its implementation, limitations and finally various techniques which can be used to circumvent the protection.

tags | paper
MD5 | 0efab163baa971c694aefcc02f81e781
Bypassing tolower() Filters In Buffer Overflows
Posted Mar 30, 2012
Authored by localh0t

This whitepaper goes into detail on how to bypass tolower() filters in buffer overflows. It uses a stack-based buffer overflow as an example but the technique can also be applied to heap overflows as well.

tags | paper, overflow
MD5 | f64919dfc1aa21cbaaaaeadd847a02ff
SafeSEH+SEHOP All-At-Once Bypass Exploitation Method Principles
Posted Jan 11, 2012

Whitepaper called SafeSEH+SEHOP all-at-once bypass exploitation method principles.

tags | paper
MD5 | 83ce42a2ebc0a0cb5a110a97fb019c23
Evading Antimalware Engines Via Assembly Ghostwriting
Posted Oct 12, 2011
Authored by antiordinary

Whitepaper called Evading Antimalware Engines via Assembly Ghostwriting.

tags | paper
MD5 | ef81349fd7e316af1415093967278318
Bypassing Windows 7 Kernel ASLR
Posted Oct 12, 2011
Authored by Stefan Le Berre

Whitepaper called Bypassing Windows 7 Kernel ASLR. In this paper, the author explains every step to code an exploit with a useful kernel ASLR bypass. Successful exploitation is performed on Windows 7 SP0 / SP1.

tags | paper, kernel, bypass
systems | windows, 7
MD5 | defeccd4921f777f49317eddd9b03190
Bypassing IDS With Return Oriented Programming
Posted Oct 4, 2011
Authored by Jonathan Salwan

Whitepaper called Bypassing IDS with Return Oriented Programming. It heavily discusses and shows the point of leveraging polymorphic shellcode in order to bypass detection.

tags | paper, shellcode
MD5 | 28f53d8ad007672928e4dc56784e256d
Bypassing ASLR/DEP
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called Bypassing ASLR/DEP. It discusses techniques to bypass these security mechanisms and how custom shellcodes are developed.

tags | paper, shellcode
MD5 | 5ff29ab616f229f91f054533fb673a46
Bypassing PHPIDS 0.6.5
Posted Aug 26, 2011
Authored by Michael Brooks

Using the attacks in this paper allows you to bypass all of PHPIDS's rule sets, which defeats all protection PHPIDS can provide. Furthermore, on a default install of PHPIDS the log file can be used to drop a PHP backdoor. This can use PHPIDS as a vital steping stone in turning an LFI vulnerability into remote code execution. The end result is that use of PHPIDS 0.6.5 can make you less secure. All of these issues have been fixed in version 0.7.

tags | paper, remote, php, code execution
MD5 | 9ab07f1c927a13a3d156d301289a0974
Defeating DEP Through A Mapped File
Posted Aug 14, 2011
Authored by Homeostasie

Whitepaper called Defeating DEP (Data Execution Prevention) through a mapped file.

tags | paper
MD5 | 6d9e97c2c0ec1ec449e0d4d86d17f894
Return-Oriented Programming / DEP Bypass
Posted Aug 3, 2011
Authored by Canberk BOLAT

This whitepaper details the ins and outs of return-oriented programming and DEP bypass.

tags | paper, bypass
MD5 | 3c0ba7861fe225de4f31036a46b987d2
Defeating Data Execution Prevention And ASLR In Windows XP SP3
Posted Jul 5, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Whitepaper called Defeating Data Execution Prevention and ASLR in Windows XP SP3. Data prevention Execution (DEP) and Address space layout randomization (ASLR) are two protection mechanisms integrated in Windows operating system to make more complicated the task of exploiting software. This document show how these two features can be bypassed using different techniques.

tags | paper
systems | windows, xp
MD5 | a67067e8e0dae7f182a786213b30aed6
Bypassing Anti-Virus Scanners
Posted Mar 29, 2011
Authored by MaXe

Whitepaper called Bypassing Anti-Virus Scanners.

tags | paper, virus
MD5 | ac6502acce41650496faa087d474e6f0
Antivirus / Firewall Evasion Techniques: Evolution Of Download Deploy Shellcode
Posted Jan 31, 2011
Authored by FB1H2S

Whitepaper called Antivirus / Firewall Evasion Techniques : Evolution of Download Deploy Shellcode.

tags | paper, shellcode
MD5 | 63609462407d404c3c538d32c4e57027
Bypassing Browser Memory Protections
Posted Jan 6, 2011
Authored by Mark Dowd, Alexander Sotirov

Whitepaper called Bypassing Browser Memory Protections.

tags | paper
MD5 | 95657eee5f5fc56951e75e9d64ec3813
Evading Antivirus Signatures
Posted Jan 4, 2011
Authored by Legion Of XTRemers

Whitepaper called Evading AV Signatures - Derailing Antivirus.

tags | paper
MD5 | 5367708e1ee5bd9006afd06da4193ce7
Binary Code Modification
Posted Aug 24, 2010
Authored by Celil Unuver

Whitepaper called Binary Code Modification. Written in Turkish.

tags | paper
MD5 | 5bb8b9a2f5e202fafd9435e503a608d2
Bypassing DEP With WPM And ROP Case Study
Posted Jun 8, 2010
Authored by Sud0

Bypassing DEP with WPM and ROP Case Study - Audio Converter by D.R. Software.

tags | paper, bypass
MD5 | 0f909efeee056cdc9d9283d2dc1b3247
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
Keylogger Uncovered On Hundreds Of HP PCs
Posted Dec 11, 2017

tags | headline, flaw, spyware, backdoor
PlexCoin Scam Founder Sentenced To Jail And Fined $10k
Posted Dec 10, 2017

tags | headline, cybercrime, fraud, scam, cryptography
Google Lifts Lid On FBI Data Requests: Now You Can Read Actual Letters Online
Posted Dec 9, 2017

tags | headline, government, privacy, usa, google, fbi
Android Flaw Lets Attack Code Slip Into Signed Apps
Posted Dec 9, 2017

tags | headline, malware, phone, flaw, google
Millions Stolen In NiceHash Bitcoin Heist
Posted Dec 9, 2017

tags | headline, hacker, cybercrime, fraud, cryptography
Apple HomeKit Flaw Left Smart Gadgets Vulnerable
Posted Dec 9, 2017

tags | headline, flaw, apple
Intel Management Engine Pwned By Buffer Overflow
Posted Dec 7, 2017

tags | headline, hacker, flaw, conference, intel
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close