what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files

VoIP Wars: Destroying Jar Jar Lync
Posted Dec 1, 2015
Authored by Fatih Ozavci | Site viproy.com

This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.

tags | paper
systems | linux
SHA-256 | 7c10f7a577fbea0fc76921b0346d6dd57980d6c5773f75f34712eadc6b092e2e
The Art Of VoIP Hacking
Posted Aug 10, 2015
Authored by Fatih Ozavci, Christos Archimandritis

This set of slide is from "The Art of VoIP Hacking", a workshop that was held at Defcon 23.

tags | paper
SHA-256 | ef720563f84090601b556006b1294eb24450124db43e13dabccb9df654d51dc0
Reflected File Download: A New Web Attack Vector
Posted Feb 16, 2015
Authored by Ofer Hafif

Presentation slides from BlackHat Europe 2014 regarding reflected file downloads as a new web attack vector.

tags | paper, web
SHA-256 | d0ddaf91840521dae18bc622076204b3c2d7271f61c75aa3adc9a3c8c8f9f4cd
VoIP Wars: Attack Of The Cisco Phones
Posted Aug 18, 2014
Authored by Fatih Ozavci

These are the slides from the presentation "VoIP Wars: Attack of the Cisco Phones" from the talk given at Defcon 22 and Blackhat USA 2014.

tags | paper
systems | cisco
SHA-256 | 720ddb24a662b21cf705390762e270841f4e60b42dfbc2cfb78cf7cff84316a9
MDSec Exploitation Notes On CVE-2014-0160
Posted May 1, 2014
Authored by Hacker Fantastic

This presentation is a set of slides that gives an overview of the Heartbleed vulnerability.

tags | paper
SHA-256 | 7278e4408858b07591a56dec3e0ae59d2bbaf5470e4ff7aa8258235334b9a0df
USB Attacks Need Physical Access Right? Not Any More...
Posted Mar 27, 2014
Authored by Andy Davis | Site nccgroup.com

NCC Group Research Director Andy Davis presented 'USB Attacks Need Physical Access Right? Not Any More...' at this year's BlackHat Asia in Singapore. Due to recent advances in a number of remoting technologies, USB attacks can now be launched over a network. The talk went into detail about how these technologies work, the resulting impact on the world of USB bugs and included a live demo remotely triggering a USB kernel bug in Windows 2012 server.

tags | paper, kernel
systems | windows
SHA-256 | 6b69c9ca16bc7b4b25c8eaf51bdad117771585a02daec7c27db6c045043dfa9c
Fully Arbitrary 802.3 Packet Injection: Maximizing The Ethernet Attack Surface
Posted Aug 2, 2013
Authored by Andrea Barisani, Daniele Bianco | Site inversepath.com

It is generally assumed that sending and sniffing arbitrary, Fast Ethernet packets can be performed with standard Network Interface Cards (NIC) and generally available packet injection software. However, full control of frame values such as the Frame Check Sequence (FCS) or Start-of-Frame delimiter (SFD) has historically required the use of dedicated and costly hardware. This presentation, given at Blackhat 2013, dissects Fast Ethernet layer 1 and 2 presenting novel attack techniques supported by an affordable hardware setup that, using customized firmware, allows fully arbitrary frame injection. Proof of concept code also included.

tags | paper, arbitrary, proof of concept
systems | linux
SHA-256 | bb338be7787778fc49af36b5ed03c58f82629edba14f5a75966b83f8bf58fd3c
Burp Suite Pro Real-Life Tips And Tricks
Posted Jun 23, 2013
Authored by Nicolas Gregoire

These are the presentation slides given at Hack in Paris 2013 giving tips and tricks for using Burp Suite Pro.

tags | paper
SHA-256 | 6eb93e4f370bae913fe79dd342c4f800b20b1c02177cbc5a77b10acdf66ce7e3
Security Assessments Of IPv6 Networks And Firewalls
Posted Jun 16, 2013
Authored by van Hauser, Fernando Gont

These are presentation slides from the German IPv6 Kongress that was held in Frankfurt, Germany in 2013.

tags | paper
SHA-256 | bc707bd82aae4f68dfff095f7eb059d3eff1bb8aae00edc3d6984f3f773c302b
IPv6 Network Reconnaissance: Theory And Practice
Posted Jun 15, 2013
Authored by Fernando Gont

These slides are from an IPv6 reconnaissance presentation given at CONFidence 2013.

tags | paper
SHA-256 | 1c0197c1d3e4ff5a462e99d9c291cb0c37f2ad96066b8709c6893ec713075389
Hacking SIP Like A Boss Presentation Slides
Posted Jun 8, 2013
Authored by Fatih Ozavci

These are the presentation slides for the Hacking SIP Like A Boss presentation given at Athcon 2013.

tags | paper
SHA-256 | 53fbc30333acdeadc3874c962abbe40c92f1c1e844a6354e73fd3df90a47f6f4
Low Level Exploits
Posted Apr 26, 2013
Authored by Hugh Pearse

This is a presentation that discusses low level exploitation such as stack buffer overflows, null pointer exceptions, etc. It offers decent examples and explanations.

tags | paper, overflow
SHA-256 | cf8f57a23f2830b47616375181328e0335105ea381d3428a3f1e91d4ded96b96
Hacking IPv6 Networks
Posted Apr 25, 2013
Authored by Fernando Gont

These are the slides for the "Hacking IPv6 Networks" security training course as given at BRUCON 2012.

tags | paper
SHA-256 | e3087a85f87af2ef63cb6ee55ffaad7558a549d506e6ff8988c95b01399882ad
Aircraft Hacking - Practical Aero Series
Posted Apr 11, 2013
Authored by Hugo Teso

These are presentation slides from a talk called Aircraft Hacking - Practical Aero Series. It was presented at HackInTheBox 2013 AMS. It discusses how controls on aircraft could be hacked and the shortcomings that need to be addressed for flight safety.

tags | paper
SHA-256 | 542bcde77cd07d80fe47993d9d5ecd2f91301b0bc3682a4924d5feb4854ba4e2
Parsing Binary File Formats With PowerShell
Posted Mar 29, 2013
Authored by Matt Graeber | Site exploit-monday.com

This archive includes a presentation and code samples. The presentation is called Parsing Binary File Formats with PowerShell.

tags | paper
systems | linux
SHA-256 | 2ee444a0cd762da3305af205e37bf1cd02f62382b8e740e9691fa5f622881576
WinCC Under X-Rays
Posted Jan 21, 2013
Authored by Sergey Gordeychik, Gleb Gritsai, Denis Baranov | Site ptsecurity.com

These are slides from a presentation call WinCC Under X-Rays.

tags | paper
SHA-256 | 48affd9265f6129d8e1b9288f64659adda11ce5640c00598776b5fa4cc425985
Reversing And Malware Analysis Training
Posted Dec 10, 2012
Authored by Amit Malik, Monnappa, Nagareshwar Talekar, Harsimran Walia, Swapnil Pathak | Site securityxploded.com

This archive holds twelves PDFs that hold presentations for Reversing and Malware Analysis Training. The Topics covered are Lab Setup Guide, Introduction to Windows Internals, Windows PE File Format Basics, Assembly Programming Basics, Reverse Engineering Tools Basics, Practical Reversing (I), Unpacking UPX, Malware Memory Forensics, Advanced Malware Analysis, Exploit Development Basics, Exploit Development Advanced, and Rootkit Analysis.

tags | paper
systems | linux, windows
SHA-256 | b983588785a2428722c7ff2fffbcea082a97f7f42fa2e24bf0c05b5a82870907
SE-2012-01 Devoxx Presentation
Posted Nov 16, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation given at Devoxx that goes into detail about the Oracle Java vulnerabilities discussed in SE-2012-01.

tags | paper, java, vulnerability
SHA-256 | 49d02139ee9c74682ac34a668af63077f0e2e4b0d473c32bb2104c25866d4982
SinFP3 EuSecWest / Ekoparty Presentation
Posted Sep 27, 2012
Authored by GomoR | Site networecon.com

These are the slides presented at EuSecWest and Ekoparty in 2012 for SinFP3 - More than a complete framework for operating system fingerprinting.

tags | paper
SHA-256 | 438deec4e015d4978b01c31e37ec43970322c4a0e93d327e0bdfcf03d803c9ea
Security Vulnerabilities Of Digital Video Broadcast Chipsets
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Vulnerabilities of Digital Video Broadcast Chipsets. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper, vulnerability
SHA-256 | b5085e8431fb1a7e2bbeb1de39c969addc0919c9cb22fbe8c72602adfcfcf41b
Security Threats In Digital Satellite Television
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Threats in the World of Digital Satellite Television. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper
SHA-256 | 61103d4ce9bcf58777deab4ee4ff4c33b39828de0f9c1efaefc51fa159e8fffc
Uncovering ZeroDays And Advanced Fuzzing
Posted May 24, 2012
Authored by Kingcope

This is a presentation called Uncovering ZeroDays and Advanced Fuzzing. It has one PDF of the presentation and one of the full script used during the presentation. This was presented at AthCon 2012.

tags | paper
systems | linux
SHA-256 | ed4e76db85a1968d96d0b168a230dcf62722f0fc8e23574007b3bcc95e50099c
Recent Advances In IPv6 Security
Posted Apr 14, 2012
Authored by Fernando Gont

These are the slides for the presentation "Recent Advances in IPv6 Security" that was given at Hackito Ergo Sum 2012.

tags | paper
SHA-256 | 26a911f6f3b82ca092f560786633c0b4c82f374446265a10e96b3f88af2c9c53
Subverting Networks
Posted Apr 11, 2012
Authored by Parul Khanna

This is a brief presentation that touches on various elements of attacks used to cause computer security issues. It is very high level.

tags | paper
SHA-256 | 40bf343ddc6f826bdaa3a6f429164fd979037dafa0de7cfaa4220c3431ebc5aa
Threat Modeling Cloud Applications
Posted Feb 18, 2012
Authored by Scott Matsumoto | Site cigital.com

These are the presentation slides from a talk called Threat Modeling Cloud Applications: What You Don't Know Will Hurt You as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | ca7ed7c83b5ae0d31004acf587fa92652ec54e92efce0b74f1135654c8dcb0a8
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close