Exploit the possiblities
Showing 1 - 25 of 58 RSS Feed

Files

VoIP Wars: Destroying Jar Jar Lync
Posted Dec 1, 2015
Authored by Fatih Ozavci | Site viproy.com

This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.

tags | paper
systems | linux
MD5 | d01f150679adc98f0bc25ca5a7f93b27
The Art Of VoIP Hacking
Posted Aug 10, 2015
Authored by Fatih Ozavci, Christos Archimandritis

This set of slide is from "The Art of VoIP Hacking", a workshop that was held at Defcon 23.

tags | paper
MD5 | 2bb191336700840493d1684a6f05b828
Reflected File Download: A New Web Attack Vector
Posted Feb 16, 2015
Authored by Ofer Hafif

Presentation slides from BlackHat Europe 2014 regarding reflected file downloads as a new web attack vector.

tags | paper, web
MD5 | f47aa9907c0eaacafaa39d214084f1f7
VoIP Wars: Attack Of The Cisco Phones
Posted Aug 18, 2014
Authored by Fatih Ozavci

These are the slides from the presentation "VoIP Wars: Attack of the Cisco Phones" from the talk given at Defcon 22 and Blackhat USA 2014.

tags | paper
systems | cisco
MD5 | bb13aada0c6fd0247b93479a050ac5e4
MDSec Exploitation Notes On CVE-2014-0160
Posted May 1, 2014
Authored by Hacker Fantastic

This presentation is a set of slides that gives an overview of the Heartbleed vulnerability.

tags | paper
MD5 | 35092de9bad17f715d8d815c0544981e
USB Attacks Need Physical Access Right? Not Any More...
Posted Mar 27, 2014
Authored by Andy Davis | Site nccgroup.com

NCC Group Research Director Andy Davis presented 'USB Attacks Need Physical Access Right? Not Any More...' at this year's BlackHat Asia in Singapore. Due to recent advances in a number of remoting technologies, USB attacks can now be launched over a network. The talk went into detail about how these technologies work, the resulting impact on the world of USB bugs and included a live demo remotely triggering a USB kernel bug in Windows 2012 server.

tags | paper, kernel
systems | windows
MD5 | ebb4ec5d752ed88d00582c1afc220984
Malicious Activity Presentation
Posted Jan 6, 2014
Authored by Nicholas Lemonias

An academic presentation on E-crime and National Preparedness. How governments and enterprises cope with the rising threat of malicious agents. This was presented at the University of Derby in England.

tags | paper
MD5 | efe0654a2bc33ffdc090a003d8142abf
Compliance, Training, And Security Awareness Presentation
Posted Jan 6, 2014
Authored by Nicholas Lemonias

A presentation on Security Training and Awareness for Enterprises. This was presented at the University of Derby - Faculty of Business, Computing and Law.

tags | paper
MD5 | cb1a42d21ebca5026ffec17491014265
Business Continuity Presentation
Posted Jan 6, 2014
Authored by Nicholas Lemonias

An in-depth analysis of Business Continuity Planning, Disaster Recovery Planning and National Preparedness. This was presented at the University of Derby in 2013.

tags | paper
MD5 | ba07254e87d3e7891bf926111d2e321b
Security Topologies Presentation
Posted Jan 6, 2014
Authored by Nicholas Lemonias

A brief but comprehensive overview of the various Internet and Network Topologies. Presented at the University of Derby, in England at the Faculty of Business, Computing and Law.

tags | paper
MD5 | d64e37c58c50571ddc58e1e17eadd64e
Social Engineering Presentation
Posted Jan 6, 2014
Authored by Nicholas Lemonias

An Enterprise management module presented by Nicholas Lemonias at The University of Derby. A comprehensive view of Social Engineering and the immense effects to Society and the Human Dimension.

tags | paper
MD5 | d4bf969fc724ba5230c82e0aaa5ad0cf
Intrusion Detection Systems Presentation
Posted Jan 6, 2014
Authored by Nicholas Lemonias

An academic presentation on the scientific architectural composition of Intrusion Detection Systems and detection methodologies. This was presented at the University of Derby in England.

tags | paper
MD5 | a07856ff6903e3163fa5139c468a54b2
Fully Arbitrary 802.3 Packet Injection: Maximizing The Ethernet Attack Surface
Posted Aug 2, 2013
Authored by Andrea Barisani, Daniele Bianco | Site inversepath.com

It is generally assumed that sending and sniffing arbitrary, Fast Ethernet packets can be performed with standard Network Interface Cards (NIC) and generally available packet injection software. However, full control of frame values such as the Frame Check Sequence (FCS) or Start-of-Frame delimiter (SFD) has historically required the use of dedicated and costly hardware. This presentation, given at Blackhat 2013, dissects Fast Ethernet layer 1 and 2 presenting novel attack techniques supported by an affordable hardware setup that, using customized firmware, allows fully arbitrary frame injection. Proof of concept code also included.

tags | paper, arbitrary, proof of concept
systems | linux
MD5 | 1dace7812895df9b7323841146cc1e00
Burp Suite Pro Real-Life Tips And Tricks
Posted Jun 23, 2013
Authored by Nicolas Gregoire

These are the presentation slides given at Hack in Paris 2013 giving tips and tricks for using Burp Suite Pro.

tags | paper
MD5 | 3185451419d91e88729d68dba756ab09
Security Assessments Of IPv6 Networks And Firewalls
Posted Jun 16, 2013
Authored by van Hauser, Fernando Gont

These are presentation slides from the German IPv6 Kongress that was held in Frankfurt, Germany in 2013.

tags | paper
MD5 | e6c73a6fcc93a33627218eef82b9e773
IPv6 Network Reconnaissance: Theory And Practice
Posted Jun 15, 2013
Authored by Fernando Gont

These slides are from an IPv6 reconnaissance presentation given at CONFidence 2013.

tags | paper
MD5 | 9f1975c39e0739d27b1e88c21bdd05f0
Hacking SIP Like A Boss Presentation Slides
Posted Jun 8, 2013
Authored by Fatih Ozavci

These are the presentation slides for the Hacking SIP Like A Boss presentation given at Athcon 2013.

tags | paper
MD5 | 539aafae9d174506acc7b85a6c4f5d40
Low Level Exploits
Posted Apr 26, 2013
Authored by Hugh Pearse

This is a presentation that discusses low level exploitation such as stack buffer overflows, null pointer exceptions, etc. It offers decent examples and explanations.

tags | paper, overflow
MD5 | 1527379c5df3a8bdc49ace3929da0b7f
Hacking IPv6 Networks
Posted Apr 25, 2013
Authored by Fernando Gont

These are the slides for the "Hacking IPv6 Networks" security training course as given at BRUCON 2012.

tags | paper
MD5 | cc61c9d06b08dae10665135b93de0a44
Aircraft Hacking - Practical Aero Series
Posted Apr 11, 2013
Authored by Hugo Teso

These are presentation slides from a talk called Aircraft Hacking - Practical Aero Series. It was presented at HackInTheBox 2013 AMS. It discusses how controls on aircraft could be hacked and the shortcomings that need to be addressed for flight safety.

tags | paper
MD5 | 9539cf09dc983c2958dcb4cda654bc98
Parsing Binary File Formats With PowerShell
Posted Mar 29, 2013
Authored by Matt Graeber | Site exploit-monday.com

This archive includes a presentation and code samples. The presentation is called Parsing Binary File Formats with PowerShell.

tags | paper
systems | linux
MD5 | 11fae6f510557858aa55bb3d3098365d
WinCC Under X-Rays
Posted Jan 21, 2013
Authored by Sergey Gordeychik, Gleb Gritsai, Denis Baranov | Site ptsecurity.com

These are slides from a presentation call WinCC Under X-Rays.

tags | paper
MD5 | 5711b231a59994ee2a1d6fcd7c4d9e88
Reversing And Malware Analysis Training
Posted Dec 10, 2012
Authored by Amit Malik, Monnappa, Nagareshwar Talekar, Harsimran Walia, Swapnil Pathak | Site securityxploded.com

This archive holds twelves PDFs that hold presentations for Reversing and Malware Analysis Training. The Topics covered are Lab Setup Guide, Introduction to Windows Internals, Windows PE File Format Basics, Assembly Programming Basics, Reverse Engineering Tools Basics, Practical Reversing (I), Unpacking UPX, Malware Memory Forensics, Advanced Malware Analysis, Exploit Development Basics, Exploit Development Advanced, and Rootkit Analysis.

tags | paper
systems | linux, windows
MD5 | cd7003cce71ab853cec70c756ca46aef
SE-2012-01 Devoxx Presentation
Posted Nov 16, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation given at Devoxx that goes into detail about the Oracle Java vulnerabilities discussed in SE-2012-01.

tags | paper, java, vulnerability
MD5 | 4a53372dee96a8967e1a76d31689b9fe
SinFP3 EuSecWest / Ekoparty Presentation
Posted Sep 27, 2012
Authored by GomoR | Site networecon.com

These are the slides presented at EuSecWest and Ekoparty in 2012 for SinFP3 - More than a complete framework for operating system fingerprinting.

tags | paper
MD5 | c707364a0c876c3884b89ec48d50558c
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
Oracle Scrambles To Fix Security Flaws In Tuxedo
Posted Nov 17, 2017

tags | headline, database, flaw, oracle
Github To Devs: Now You'll Get Security Alerts On Flaws In Popular Software Libraries
Posted Nov 17, 2017

tags | headline, flaw
Keystone Pipeline Leaked 210,000 Gallons Of Oil In South Dakota
Posted Nov 17, 2017

tags | headline, flaw
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close