exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 55 RSS Feed

Files

DnsPinningAndWebProxies.pdf
Posted Jul 11, 2007
Authored by Dafydd Stuttard | Site ngssoftware.com

DNS Pinning and Web Proxies - A white paper that describes DNS based attacks against web proxies.

tags | paper, web
SHA-256 | e091af8bf559a04f3c1150ba90ac58ae3ddd17fb123c3630be4e8ae38dcdaf3c
csrf-surf.txt
Posted May 22, 2007
Authored by Nexus | Site playhack.net

Whitepaper titled Cross Site Request Forgery: The Sea Surf.

tags | paper, web, csrf
SHA-256 | 5f2993a62fbb64d5422e96ba9b08bcc4be5bff77401acc7bef23bc85e71da389
AmbiguityInAjaxLockdownFramework.pdf
Posted Feb 13, 2007
Authored by Aditya K Sood | Site zeroknock.metaeye.org

Whitepaper entitled Ambiguity In Ajax Lockdown Framework - Unveiling Some Contradictory Facts.

tags | paper, web
SHA-256 | c72d1fdf0586fb064c35e73407382130
EBayAtt.pdf
Posted Jan 4, 2007
Authored by Zeroknock | Site zeroknock.metaeye.org

Small paper entitled EBay Online Attack Jargon.

tags | paper, web
SHA-256 | 04ad495da411ca6f23da1f5c458c29f200473ff4506ec284d569b31a2c29fbbf
XSRF_Paper.pdf
Posted Oct 20, 2006
Authored by Jesse Burns | Site isecpartners.com

Paper describing the various methods and techniques of cross site reference forgery.

tags | paper, web
SHA-256 | 0d74b20fe311533c844750df4a40b17be780bbfc0f1cf786aac71f4e1b316276
JS_SearchQueryTheft.pdf
Posted Oct 4, 2006
Authored by Billy Hoffman | Site spidynamics.com

SPI Labs has discovered a practical method of using JavaScript to detect the search queries a user has entered into arbitrary search engines. All the code needed to steal a user's search queries is written in JavaScript and uses Cascading Style Sheets (CSS). This code could be embedded into any website either by the website owner or by a malicious third party through a Cross-site Scripting (XSS) attack. There it would harvest information about every visitor to that site.

tags | paper, web, arbitrary, javascript, xss
SHA-256 | ab08229f9a6ea3fe80e91cf97309e02f0a0606aa8ea3b1985c6e81d4195f426e
belva-att-unknown.web.vulns.pdf
Posted Jun 29, 2006
Authored by Kenneth F. Belva | Site ftusecurity.com

Presentation entitled "Case Studies in Finding Previously Unknown Vulnerabilities in Web Applications" from the AT&T ISNN Lecture Series. The aim of the presentation is to cover a limited set of web application vulnerability types and show the impact of these vulnerabilities via real world cases.

tags | paper, web, vulnerability
SHA-256 | 864d22be9ea2fbe90fc389e48dd1b7e860db2d314108cd24933a16b4659c7ec8
XST Strikes Back - Cross Site Tracing Whitepaper
Posted Jan 27, 2006
Authored by AKsecurity

XST Strikes Back - A technical paper discussing Cross Site Tracing vulnerabilities in proxy servers.

tags | paper, web, vulnerability
SHA-256 | c934a83e625611f6470be7257fa46f16e64a415f899bccbeb6d42966dd6a3e9a
reverseProxyXSS.txt
Posted Jan 21, 2006
Authored by Shalom Carmel

Small write up discussing reverse proxy cross site scripting.

tags | paper, web, xss
SHA-256 | eae37617973a2892bf4ac789d799e0b8a3209e0ea2ccda63640fab3a48f15ca5
MSN_Search_For_WebApp.pdf
Posted Dec 7, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper entitled 'Web Application Footprinting and Assessment with MSN Search Tricks'.

tags | paper, web
SHA-256 | 21fa9f7a4c5cc5110927a0d58b634ca2cc3a52a3998262dfccb65e1141516e43
browser_ident.pdf
Posted Aug 17, 2005
Authored by Shreeraj Shah | Site net-square.com

White paper discussing web browser identification and how proper identification can enable a remote site to know what attacks to use against a visitor.

tags | paper, remote, web
SHA-256 | af292d7644b45c3e998a980f23ff821b434d866040446022bb3ee6a5b46b07a2
domain_footprints.pdf
Posted Aug 14, 2005
Authored by Shreeraj Shah | Site net-square.com

White paper called Domain Footprint for Web Applications and Web Services.

tags | paper, web
SHA-256 | 334c5dacdca8cb229f4e6fcd4408159edff35ea5eb82f949449c0fe623215485
browserRender.txt
Posted Jul 15, 2005
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Interesting write up regarding possible code execution vulnerabilities in Microsoft Internet Explorer due to problems with image decompression and parsing.

tags | paper, web, vulnerability, code execution
SHA-256 | 8aa59c5262d0659c3680241d1e53f860d9626568c3b86d989d08cba6b374e641
yawcssibp.txt
Posted May 7, 2005
Authored by Zinho | Site hackerscenter.com

Yet Another "Why CSS Is Bad" Paper.

tags | paper, web
SHA-256 | 0c887d986ae284f7c70a519bdfe8487982c28a01419f992b0641e7cd3f0249f4
WebServices_Profiling.pdf
Posted Mar 25, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper discussing the scope of information gathering used against web services. Second in a series of papers defining attack and defense methodologies with web services.

tags | paper, web
SHA-256 | d845104342be64b7e0981391fa4587731812589b1eaa8df8bb900cb3c06d39eb
Advanced_XSS_Control.txt
Posted Feb 18, 2005
Authored by Anton Rager

Advanced Cross-Site-Scripting with Real-time Remote Attacker Control - Some people think XSS attacks are no big deal, but I plan to change that perception with the release of this paper and an accompanying tool called XSS-Proxy which allows XSS attacks to be fully controlled by a remote attacker. This paper describes current XSS attacks and introduces new methods/tool for making XSS attacks interactive, bi-directional, persistent and much more evil. This is not a detailed XSS HowTo, but an explanation of methods for taking XSS attacks much further. Attackers can access sites as the victim or forward specific blind requests to other servers.

tags | paper, remote, web
SHA-256 | 8f3f833faade0f8c6add6576e39ff2be36df99d31657b8eb6613799fa7945aa6
013105.txt
Posted Feb 1, 2005
Authored by Jeremiah Grossman | Site webappsec.org

The 80/20 Rule for Web Application Security: Increase your security without touching the source code . This article discusses ways to make your website more difficult to exploit with little effort.

tags | paper, web
SHA-256 | bba7f7e823c6583f2e30e376b8c5ab99b4d303a27d637867f9f30645116bb148
WebServices_Info_Gathering.pdf
Posted Jan 27, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper discussing the scope of information gathering used against web services. First in a series of papers defining attack and defense methodologies with web services.

tags | paper, web
SHA-256 | 41051ad1f79babf058f6e50a6da49759baee349f285fbc702e91c39d819f38f8
Defense_using_mod_security.pdf
Posted Jan 12, 2005
Authored by Shreeraj Shah | Site net-square.com

A thoroughly written white paper discussing how to defend web services using mod_security.

tags | paper, web
SHA-256 | bff27e41da0ed96737c94d7f79f29f3432e83dda6ab0b1eed20e27122f946d50
creating_a_asp_command_shell_using_BACKUP.txt
Posted Oct 24, 2004
Authored by Swan | Site 0x557.org

This is a small text document that describes how MS SQL can be "tricked" into creating a command.asp script under the webroot, even when you do not have access to 'sa' privs (dbo privs are probably still a must, though). The technique described uses the SQL server 'backup' command.

tags | paper, web, asp
SHA-256 | 00f4e7c9f7cd17235e6b6b60f335065c99183f5e4af191f5b7d9dfcb8975e8a2
CookiePathBestPractice.pdf
Posted May 20, 2004
Authored by Martin O'Neal | Site corsaire.com

Corsaire White Paper: Cookie Path Best Practice. A brief document discussing how and why a cookie path should be strictly defined.

tags | paper, web
SHA-256 | c30fa2410156b0fdf005bdaacdb6fc9efd561e2ce36194f3f8f20250a403b84a
ProxyBypass.pdf
Posted Feb 12, 2003
Authored by flur | Site flurnet.org

Comprehensive paper explaining various ways to get around restrictive web proxies which are used by some restrictive countries and corporations.

tags | paper, web
SHA-256 | 8d9d766cd21a65b57e4c66bdeab1db1cf15172a76f5abf3a8ffb6b63490001ab
session_fixation.pdf
Posted Dec 20, 2002
Authored by Mitja Kolsek | Site acros.si

Session Fixation Vulnerability in Web-based Applications - Many web-based applications employ some kind of session management to create a user friendly environment. Sessions are stored on a server and associated with respective users by sessions identifiers (IDs). Naturally session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are employing techniques for protecting session IDs from three classes of attacks: interception, prediction, and brute force attacks. This paper reveals a fourth class of session attacks against session IDs: session fixation attacks.

tags | paper, web
SHA-256 | e8a24bd745c20648c072b561ba4717627c93a9e649320428356139d804231bd5
cgi-explained.doc
Posted Dec 11, 2002
Authored by Gary Brooks

Some information on the Common Gateway Interface (CGI).

tags | paper, web, cgi
SHA-256 | 8b26cd32cbd0a8326977f61fce8ef55d9a9016bc2750bd213be84e63a401d2b0
xss-faq.txt
Posted Jul 31, 2002
Authored by Zeno | Site Cgisecurity.com

The Cross Site Scripting FAQ - Includes threat analysis, examples of cross site scripting attacks, cookie theft, how to protect yourself, and how to fix the holes.

tags | paper, web, xss
SHA-256 | 661e74609dc323f6e78804ba0e5ebb3534a09bcb6cea0f0f0bbc0773b2ba234a
Page 2 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close