Fri, 19 Jan 2018 12:12:12 GMT
Kernel Exploitation Part 6: NULL Pointer Dereference
Whitepaper called Kernel Exploitation 6: NULL pointer dereference.
Fri, 19 Jan 2018 11:11:11 GMT
Kernel Exploitation Part 4: Stack Buffer Overflow (SMEP Bypass)
Whitepaper called Kernel Exploitation 4: Stack Buffer Overflow (SMEP Bypass).
Thu, 18 Jan 2018 20:42:24 GMT
Kernel Exploitation Part 5: Integer Overflow
Whitepaper called Kernel Exploitation 5: Integer Overflow.
Mon, 15 Jan 2018 16:10:36 GMT
Positive Hack Days VIII Call For Papers
Call For Papers for Positive Hack Days VIII which will take place in Moscow, Russia.
Fri, 12 Jan 2018 10:02:22 GMT
Using dnscat2 For Encrypted Command/Control Over DNS
The process of setting up and using dnscat2 is documented in this article. The tool consists of a Ruby server and a small C client, and can be used to quickly establish an encrypted covert channel between two computers over the Internet using DNS traffic. Once set up, the tool is evaluated by exfiltrating data out of a network that has a pfSense firewall at the perimeter blocking direct outbound DNS requests from client machines, and also running the Snort IDS. It is is seen that a reverse shell is successfully sent out of the network and no IDS alerts are generated.
Thu, 11 Jan 2018 02:43:34 GMT
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
Whitepaper called Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference.
Thu, 11 Jan 2018 02:27:23 GMT
beVX Offensive Security Conference 2018 Call For Papers
beVX! has announced its call for papers. It will take place September 20th through the 21st, 2018 in Hong Kong.
Wed, 10 Jan 2018 00:02:22 GMT
Nuit Du Hack 2018 Call For Papers
The Nuit Du Hack Call For Papers for 2018 has been announced. It will be held June 30th through July 1st, 2018 in Paris, France.
Thu, 04 Jan 2018 17:16:06 GMT
Poking A Hole In Whitelist For Bypassing Firewall
Whitepaper called Poking a Hold in Whitelist for Bypassing Firewall.
Thu, 04 Jan 2018 17:12:03 GMT
Meltdown - Bypassing Intel's Hardware Barrier
Whitepaper called Meltdown. It discusses how you can bypass Intel's hardware barrier between applications and the computer's core memory.
Thu, 04 Jan 2018 15:04:39 GMT
Spectre Attacks: Exploiting Speculative Execution
Whitepaper called Spectre Attacks: Exploiting Speculative Execution. It discusses how to trick error-free applications into giving up secret information.
Tue, 02 Jan 2018 17:51:41 GMT
Reading Privileged Memory With A Side-Channel
This is the very thorough blog write-up discussing three variants of side-channel attacks that can be leveraged against CPU data cache timing.
Tue, 19 Dec 2017 15:55:55 GMT
FAQin Congress 3 Call For Proposals
FAQin Congress is a free invitation-only underground hacking event in Madrid, Spain being held March 1st through the 3rd, 2018. The call for proposals has been announced.
Tue, 19 Dec 2017 02:33:33 GMT
BSidesLjubljana 2018 Call For Papers
B-Sides Ljubljana will be held March 10th, 2018 in Ljubljana, Slovenia.
Tue, 05 Dec 2017 16:22:22 GMT
This is a brief whitepaper discussing how to perform man-in-the-middle attacks as an exit node on TOR.
Fri, 01 Dec 2017 14:04:44 GMT
BSides SF 2018 Call For Papers
BSides SF is soliciting papers and presentations for the 2018 annual BSidesSF conference. It will be located at City View at the Metreon in downtown San Francisco April 15th through the 16th, 2018.
Mon, 06 Nov 2017 20:22:22 GMT
NorthSec 2018 Call For Papers
NorthSec 2018 has announced its Call For Papers. It will be held in Montreal, Canada, from May 14th through the 20th, 2018.
Mon, 06 Nov 2017 04:44:44 GMT
Bypassing Browser Security Policies For Fun And Profit
In this paper, the authors present their research about bypassing core security policies implemented inside browsers such as the "Same Origin Policy". They present several bypasses that were found in various mobile browsers. In addition, they also uncover other interesting security flaws found during their research such as Address Bar Spoofing, Content Spoofing, Cross Origin CSS Attacks, Charset Inheritance, CSP Bypass, Mixed Content Bypass etc. as found in Android Browsers. This is from a talk given at BlackHat ASIA 2016.
Thu, 19 Oct 2017 03:33:33 GMT
WorldCIST 18 Call For Papers
The Information Systems and Technologies research and industrial community is invited to submit proposals of Workshops for WorldCist'18. It will be held in Naples, Italy March 27th through the 29th, 2018.
Mon, 16 Oct 2017 13:34:29 GMT
Hacksys Extreme Vulnerable Windows Driver Analysis Part 1
Whitepaper called Hacksys Extreme Vulnerable Windows Driver Analysis. Part 1 of a series. Written in Arabic.
Wed, 04 Oct 2017 23:23:23 GMT
Key Reinstallation: Forcing Nonce Reuse In WPA2
Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected.
Tue, 19 Sep 2017 14:41:37 GMT
nullcon Goa 2018 Call For Papers
The Call For Papers for nullcon Goa 2018 is now open. It's the time of the year when they welcome research done by the community as paper submissions for nullcon. So, sip your coffee, dust your debuggers, fire your tools, challenge your grey cells and shoot them an email. It will take place March 2nd through the 3rd, 2018 in Goa, India.
Mon, 04 Sep 2017 00:22:22 GMT
RECON Brussels 2018 Call For Papers
RECON Brussels has announced it's call for papers. The conference will take place January 29th through February 4th, 2018 in Brussels, Belgium.
Mon, 28 Aug 2017 03:33:33 GMT
Code Injection - HTML Injection
Whitepaper that discussions both code and html injection attacks.
Offensive And Defensive PowerShell
Whitepaper called Offensive and Defensive PowerShell. Written in Turkish.
view page: 95