Twenty Year Anniversary
Showing 1 - 25 of 865 RSS Feed

Files

Machine Learning - Learning Cybersecurity
Posted Aug 10, 2018
Authored by Akash Sarode

Whitepaper called Machine Learning - Learning Cybersecurity.

tags | paper
MD5 | d613a476834fa541683149987754490a
File Upload Restrictions Bypass
Posted Jul 23, 2018
Authored by Haboob Team

Whitepaper called File Upload Restrictions Bypass.

tags | paper, file upload
MD5 | 9d615f9f2d0f44874ac4900c33b860ef
Protecting Apps Against Jailbreaking And Rooting
Posted Jul 23, 2018
Authored by Haboob Team

Whitepaper called Protecting Apps Against Jailbreaking And Rooting. Written in Arabic.

tags | paper, root
MD5 | d3a4658f89d1a4cec29023fc05fc7223
AntiVirus Evasion With Metasploit's Web Delivery
Posted Jul 18, 2018
Authored by Dr. Adrian Vollmer

Whitepaper called AntiVirus Evasion with Metasploit's Web Delivery - Leveraging PowerShell to Execute Arbitrary Shellcode.

tags | paper, web, arbitrary, shellcode
MD5 | 68e94c755f9d49405de6fd9c85c19ce2
VLAN Hopping Attack
Posted Jul 18, 2018
Authored by Haboob Team

Whitepaper called VLAN Hopping Attack.

tags | paper
MD5 | 5e2517d456e1c2bcc968d64f8f21223c
Sony Playstation 4 5.05 BPF Double Free
Posted Jul 18, 2018
Authored by Specter, qwertyoruiopz

Sony Playstation 4 version 5.05 BPF double-free kernel exploit whitepaper.

tags | paper, kernel
MD5 | 211837c5b7a80994fc356f4c3f44eb56
Abusing Kerberos: Kerberoasting
Posted Jul 18, 2018
Authored by Haboob Team

Whitepaper called Abusing Kerberos: Kerberoasting.

tags | paper
MD5 | 8c413012e885065de8ecd743e14a240e
Rikki Don't Lose That Bluetooth Device
Posted Jul 11, 2018
Authored by Matthias Deeg, Gerhard Klostermeier

In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don't want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

tags | paper
MD5 | ca29bc7edd73c43f926cb262ce678f74
UAC Bypass And Research With UAC-A-Mola
Posted Jun 28, 2018
Authored by Pablo Gonzalez Perez, Santiago Hernandez Ramos

Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.

tags | paper, bypass
MD5 | 9db859b7c52f75528ae79aa88beb8b30
Case Study: Security Of Modern Bluetooth Keyboards
Posted Jun 22, 2018
Authored by Matthias Deeg, Gerhard Klostermeier

This whitepaper is a case study that analyzes the security of modern bluetooth keyboards. In the course of this research project, SySS GmbH analyzed three currently popular wireless keyboards using Bluetooth technology that can be bought on the Amazon marketplace for security vulnerabilities. The following three devices were tested for security issues from different attacker perspectives: 1byoneKeyboard, LogitechK480, and MicrosoftDesignerBluetoothDesktop (Model1678 2017).

tags | paper, vulnerability
MD5 | 066966c0a18d2c6ee4c885c5fb48bd21
EggHunter Buffer Overflow For Windows
Posted Jun 14, 2018
Authored by Haboob Team

Whitepaper called EggHunter Buffer Overflow for Windows. Written in Arabic.

tags | paper, overflow
systems | windows
MD5 | 7530d81f5ea60524126e7b277d92327b
Lateral Movement Using WinRM
Posted Jun 14, 2018
Authored by Haboob Team

Whitepaper called Lateral Movement using WinRM. Written in Arabic.

tags | paper
MD5 | ae51d28d40ed1f07fccc954c21dc8733
Reverse Engineering - Simple Patching
Posted Jun 11, 2018
Authored by Haboob Team

Whitepaper called Reverse Engineering - Simple Patching. Written in Arabic.

tags | paper
MD5 | 68a7ae72fae2210e2a4d9ace43c125d5
Android Application Pentest With Drozer
Posted Jun 1, 2018
Authored by Artin Ghafary

Whitepaper called Android Application Pentest With Drozer. Written in Persian.

tags | paper
MD5 | bce46a39c54c0e5f1caa0c8d31110f1f
SEH Buffer Overflow Basic Exploitation Tutorial
Posted Jun 1, 2018
Authored by Haboob Team

This is a SEH buffer overflow basic exploitation tutorial. Written in Arabic.

tags | paper, overflow
MD5 | d914b71bb22db16a92bb6096551d3397
Deserialization Vulnerabilities
Posted May 26, 2018
Authored by intx0x80

This whitepaper explains deserialization vulnerabilities in Java, Python, PHP, and Ruby.

tags | paper, java, php, vulnerability, python, ruby
MD5 | 003eecb39455d3d75ab4d3f37d2cb166
Introduction To Wireless Network Penetration Testing
Posted May 23, 2018
Authored by Moslem Haghighian

Whitepaper called Introduction to Wireless Network Penetration Testing. Written in Persian.

tags | paper
MD5 | 1b19373c6ccb377a6400ea115b877a24
Code Review Steps And Methodologies
Posted May 23, 2018
Authored by Jameel Nabbo

Whitepaper called Code Review Steps and Methodologies.

tags | paper
MD5 | 735525da63576a35964d6bc60e144a48
Web Forensics
Posted May 10, 2018
Authored by ManhNho

Whitepaper called Web Forensics. Written in Vietnamese.

tags | paper, web
MD5 | 82843c871392c0d0efffb6e7058c21d6
Linux Restricted Shell Bypass Guide
Posted May 6, 2018
Authored by n4ckhcker, h4d3sw0rm

Whitepaper titled Linux Restricted Shell Bypass Guide.

tags | paper, shell
systems | linux
MD5 | d27133695ec11bcee5f1145b62e7f195
Windows Kernel Exploitation Tutorial Part 8: Use After Free
Posted May 4, 2018
Authored by rootkit

Whitepaper called Windows Kernel Exploitation Tutorial Part 8: Use After Free.

tags | paper, kernel
systems | windows
MD5 | 89f76cdffee77908ed5e8f26120672b7
Nintendo Switch / Nvidia Fusee Gelee Disclosure
Posted Apr 26, 2018
Authored by Katherine Temkin

This report documents Fusee Gelee, a coldboot vulnerability that allows full, unauthenticated arbitrary code execution from an early bootROM context via Tegra Recovery Mode (RCM) on NVIDIA's Tegra line of embedded processors. As this vulnerability allows arbitrary code execution on the Boot and Power Management Processor (BPMP) before any lock-outs take effect, this vulnerability compromises the entire root-of-trust for each processor, and allows exfiltration of secrets e.g. burned into device fuses.

tags | paper, arbitrary, root, code execution
MD5 | 0ab768a01218de89b109624ec71ed96b
Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework
Posted Apr 24, 2018
Authored by Santiago Hernandez Ramos

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.

tags | paper, protocol, fuzzer
MD5 | 9eca60d90eccec483d8294bf95607a9b
Bridging The Gap Between SIPR And NIPR Using KVM Switches
Posted Apr 24, 2018
Authored by debug.net

This paper documents a minor but somewhat easy way to compromise air gapped systems that share a kvm.

tags | paper
MD5 | dc6b2a5f7beae67e10dd8d98be983b41
The Origin And Impact Of Security Vulnerabilities In ST Chipsets
Posted Apr 21, 2018
Site security-explorations.com

This whitepaper explores the origin and impact of the vulnerabilities discovered in ST chipsets.

tags | paper, vulnerability
MD5 | 0c95d5b2547b920efafeca36b10548c1
Page 1 of 35
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Appliance Botnet Could Bring Power Grid To Its Knees
Posted Aug 17, 2018

tags | headline, flaw, scada
Chinese Hackers Target Alaska
Posted Aug 17, 2018

tags | headline, hacker, government, usa, china, cyberwar
Necurs Botnet Launches Fresh Assault Against Banks
Posted Aug 17, 2018

tags | headline, malware, bank, cybercrime, botnet, fraud
Apple Hack Teen Pleads Guilty
Posted Aug 17, 2018

tags | headline, hacker, data loss, apple
Google Expands Bug Bounty To Include Fraud Protection Bypass
Posted Aug 16, 2018

tags | headline, fraud, flaw, google
Credit Card Skimmers Now Need To Fear The Reaper
Posted Aug 16, 2018

tags | headline, hacker, bank, cybercrime, fraud, conference
The Hackers Hunting Down Missing People
Posted Aug 16, 2018

tags | headline, hacker, privacy, conference
President Trump Relaxes US Cyber-Attack Rules
Posted Aug 16, 2018

tags | headline, government, usa, cyberwar, fbi, nsa, cia
Mystery Russian Satellite's Behavior Raises Alarm In US
Posted Aug 15, 2018

tags | headline, usa, russia, space, cyberwar, spyware
Adobe Fixes Critical Code Execution Flaws In Latest Patch Update
Posted Aug 15, 2018

tags | headline, flaw, adobe, patch
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close