Whitepaper Files ≈ Packet Storm
Assembly "Wrapping": A Technique For Anti-Disassembly
Whitepaper called Assembly "Wrapping": A Technique for Anti-Disassembly.
WhatsApp Remote Code Execution
Whitepaper discussing how to leverage the WhatsApp remote code execution vulnerability that takes advantage of a double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library.
Exploit Command Injection Router Via Reverse Firmware Technique
Whitepaper called Exploit Command Injection Router via reverse firmware technique.
Active Directory Exploitation Cheat Sheet
This is a cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Writing A Quick Packet Sniffer With Python And Scapy
Whitepaper called Writing a Quick Packet Sniffer with Python and Scapy.
Cloud As An Attack Platform
This is a whitepaper that presents an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. The researchers presented the participants with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve their understanding of necessary security controls and...
Reverse Engineering Android Application
Whitepaper called Reverse Engineering Android Application.
Detect SQL Injection WordPress Plugin Using RegEx
Whitepaper called Detect SQL Injection WordPress Plugin using RegEx.
Abusing Windows Data Protection API
Whitepaper called Abusing Windows Data Protection API.
IOT Firmware Analysis
Whitepaper called IOT Firmware Analysis that walks through extraction and analysis.
BlueReader.org © 2020