All Hot News World. Public world blog, journal online reviewed.

Whitepaper File, PacketStorm Security

RSS feed: Whitepaper File, PacketStorm Security
Fri, 14 Jun 2019 17:22:22 GMT
Whitepaper Files ≈ Packet Storm
Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers [ + ]
Wed, 12 Jun 2019 17:22:22 GMT
Active Directory Enumeration With PowerShell
Whitepaper called Active Directory Enumeration with PowerShell. [ + ]
Tue, 04 Jun 2019 04:44:44 GMT
LDAP Swiss Army Knife
This paper presents the "LDAP Swiss Army Knife", an easy to use LDAP server implementation built for penetration oder software testing. Apart from general usage as a server or proxy it also shows some specific attacks against Java/JNDI based LDAP clients. [ + ]
Tue, 04 Jun 2019 04:22:22 GMT
Analysis Of CVE-2019-0708 (BlueKeep)
This whitepaper provides a thorough analysis of CVE-2019-0708, also known as BlueKeep. [ + ]
Fri, 24 May 2019 14:33:33 GMT
A Debugging Primer With CVE-2019-0708
Whitepaper called A Debugging Primer with CVE-2019-0708. [ + ]
Fri, 24 May 2019 03:44:44 GMT
Web Application Firewall Bypass Methods
Whitepaper called Web Application Firewall Bypass Methods. Written In Turkish. [ + ]
Fri, 10 May 2019 16:58:41 GMT
Penetration Testing Steps And Tools
Whitepaper called Penetration Testing Steps and Tools. Written In Turkish. [ + ]
Wed, 01 May 2019 14:44:44 GMT
ROOTCON 13 Call For Papers
The ROOTCON 13 Call For Papers has been announced. It will be held September 25th through the 27th, 2019 at the Taal Vista Hotel, Tagaytay, Philippines. [ + ]
Tue, 30 Apr 2019 10:11:11 GMT
Johnny You Are Fired
This archive contains proof of concepts and a whitepaper that describes multiple email client implementations where popular clients for email are vulnerable to signature spoofing attacks. [ + ]
Thu, 18 Apr 2019 17:24:03 GMT
Jumping Firewall With Tunneling Techniques
This is a whitepaper that discusses bypassing a firewall using tunneling techniques. Written in Turkish. [ + ]
Mon, 08 Apr 2019 18:11:55 GMT
Redacted Report On The Investigation Into Russian Interference In The 2016 Presidential Election
Released 2019/04/18 by the United States Justice Department, this is the Report On The Investigation Into Russian Interference In The 2016 Presidential Election. This is the redacted version. [ + ]
Fri, 05 Apr 2019 22:55:28 GMT
Hackers 2 Hackers Conference 16th Edition Call For Papers
The call for papers for H2HC 16th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 26th through the 27th, 2019. [ + ]
Fri, 05 Apr 2019 22:48:34 GMT
hardwear.io 2019 Call For Papers
hardwear is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper. A conference in the USA will take place June 11th through the 14th, 2019 and another will take place in the Netherlands September 23rd through the 27th. [ + ]
Tue, 26 Mar 2019 15:10:43 GMT
c0c0n 2019 Call For Papers
The c0c0n 2019 call for papers has been announced. It will take place September 25th through the 28th, 2019 at the Grand Hyatt, Kochi (Cochin), Kerala, India. [ + ]
Tue, 26 Mar 2019 14:02:22 GMT
RECON 2019 Call For Papers
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It will be held June 28th through the 30th, 2019, in Montreal, Canada. [ + ]
Mon, 18 Mar 2019 19:32:22 GMT
JMX RMI - Multiple Applications RCE
This whitepaper discusses highlights of findings related to remote code execution leveraging JMX/RMI. [ + ]
Thu, 14 Mar 2019 16:33:59 GMT
Microsoft Windows Binary Planting
This is a short write-up on binary planting along with a few old-school 0-days which may still be helpful for pentesters willing to escalate privileges on Windows. [ + ]
Sun, 10 Mar 2019 13:13:13 GMT
IPv6 Security For IPv4 Engineers
This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as much of the existing IPv4 knowledge and experience as possible. It highlights the security issues that affect both protocols in the same manner, as well as those that are new or different for the IPv6 protocol suite. Additionally, it discusses the security implications arising from the co-existence of the IPv6 and IPv4 protocols. [ + ]
Fri, 08 Mar 2019 19:22:22 GMT
How Do You Use An XSS As A Keylogger?
This is the world's shortest whitepaper showing how to use javascript to record keystrokes and log them. [ + ]
Thu, 07 Mar 2019 10:11:11 GMT
Flexpaper 2.3.6 Remote Code Execution
Whitepaper discussing Flexpaper versions 2.3.6 and below which suffer from a remote code execution vulnerability. [ + ]
Thu, 07 Mar 2019 02:07:30 GMT
File Transfer Skills In The Red Team Post Penetration Test
Whitepaper called File transfer skills in the red team post penetration test. [ + ]
Thu, 28 Feb 2019 20:22:22 GMT
SPOILER: Speculative Load Hazards Boost Rowhammer And Cache Attacks
Whitepaper called SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. This research was produced jointly between Worcester Polytechnic Institute and University of Lubeck. It has been noted that software mitigations tied to Spectre will not mitigate this newly identified issue. [ + ]
Tue, 26 Feb 2019 00:40:59 GMT
Android Securty Research: Crypto Local Storage Attack
Whitepaper called Android Security Research: Crypto Wallet Local Storage Attack. [ + ]
Tue, 19 Feb 2019 18:22:22 GMT
PDF Viewer Signatures Broken
Researchers from Ruhr-University Bochum in Germany have broken digital signatures on PDFs and managed to create fake signatures on 21 of 22 viewer apps and five out of the seven online PDF digital signing services. This archive contains both whitepapers produced by the university. [ + ]
Fri, 01 Feb 2019 17:24:57 GMT
Subdomain Takeover
Whitepaper called The Ultimate Guide for Basic Subdomain Takeover with Practical. [ + ]

Remote Code Execution With EL Injection Vulnerabiltiies
This paper discusses a vulnerability class called "Expression Language Injection (EL Injection)". Although several security researchers have published details in the past, the bug class is still fairly unknown. EL Injection is a serious security threat over the Internet for the various dynamic applications. In today's world, there is a universal need present for dynamic applications. As the use of dynamic applications for various online services is rising, so is the security threats increasing. This paper defines a methodology for detecting and exploiting EL injection. [ + ]
PacketStorm Security

2013 Copyright © Techhap.com Mobile version 2015 | PeterLife & company World news today. Popular science publications online. The best manufacturers in the world. Products for industrial purposes. News of science and technology. Encyclopedic articles. Photos and videos. Science History. Promotion of manufacturers sites. Industrial goods. Display of goods stores online. | Terms of use Link at is mandatory if site materials are using fully or particulary. | Skimlinks helps publishers monetize editorial content through automated affiliate links for products. News: Affiliate programm. | Script Nevius. | Site Public Relations 1PS. | Hosting: Valuehost.
Yandex.ru