exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 1,142 RSS Feed

Files

DTLS ClientHello Race Conditions In WebRTC Implementations
Posted Oct 22, 2024
Authored by Sandro Gauci, Alfred Farrugia | Site enablesecurity.com

This white paper, titled "DTLS 'ClientHello' Race Conditions in WebRTC Implementations," details a security vulnerability affecting multiple WebRTC implementations. The research uncovers a security flaw where certain implementations fail to properly verify the origin of DTLS "ClientHello" messages in WebRTC sessions, potentially leading to denial of service attacks. The paper includes methodology, affected systems, and recommendations for mitigation.

tags | paper, denial of service
SHA-256 | eb9b90060957ab9a31665bc8c84c603533eeccd79e0c24bfa578d26e43901509
Unleashing Worms And Extracting Data
Posted Sep 16, 2024
Authored by Ben Nassi, Ron Bitton, Stav Cohen | Site arxiv.org

Whitepaper called Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking. In this paper, the authors show that with the ability to jailbreak a GenAI model, attackers can escalate the outcome of attacks against RAG-based GenAI-powered applications in severity and scale.

tags | paper, worm
SHA-256 | 27bfeb9c59e588b146b6eb3f569fcfb1228d2be7bf7e469574b84bb54bb020c3
BRF: eBPF Runtime Fuzzer
Posted Jul 8, 2024
Authored by Hsin-Wei Hung, Ardalan Amiri Sani

This whitepaper discusses eBPF technology in the Linux kernel and introduces the BPF Runtime Fuzzer (BRF), a fuzzer that can satisfy the semantics and dependencies required by the verifier and the eBPF subsystem.

tags | paper, kernel, fuzzer
systems | linux
SHA-256 | 8d7d42a9efa0c15df2a3a0e4462495f6a65acfd39a1058f872b1863580c0bfb6
Surveilling The Masses With Wi-Fi-Based Positioning Systems
Posted May 23, 2024
Authored by Dave Levin, Erik Rye | Site cs.umd.edu

In this paper, the authors show that Apple's WPS can be abused to create a privacy threat on a global scale. They present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Their attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, they learned the precise locations of over 2 billion BSSIDs around the world. The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices' movements.

tags | paper
systems | apple
SHA-256 | 32f974d742e05d50152e5a1e9ab7b267486c7c525e011e9325dc7495c5a27a6a
SSH Client Backd00r
Posted Apr 22, 2024
Authored by Tacettin Karadeniz

This whitepaper provides a detailed analysis of the recent SSH client backdoor. Written in Turkish.

tags | paper
SHA-256 | ce4d2798fcc0bd6073620253319c3a70e1d899442c3920c83b9dc3acd8dfe046
GhostRace: Exploiting And Mitigating Speculative Race Conditions
Posted Mar 13, 2024
Authored by Cristiano Giuffrida, Anil Kurmus, Hany Ragab, Andrea Mambretti | Site download.vusec.net

Race conditions arise when multiple threads attempt to access a shared resource without proper synchronization, often leading to vulnerabilities such as concurrent use-after-free. To mitigate their occurrence, operating systems rely on synchronization primitives such as mutexes, spinlocks, etc. In this paper, the authors present GhostRace, the first security analysis of these primitives on speculatively executed code paths. Their key finding is that all the common synchronization primitives can be microarchitecturally bypassed on speculative paths, turning all architecturally race-free critical regions into Speculative Race Conditions (SRCs).

tags | paper, vulnerability
advisories | CVE-2024-2193
SHA-256 | e0d3a753ac273a430c317cd67e808c20b6cdd914b31b24e71450d5fb4ad420af
Stealing Part Of A Production Language Model
Posted Mar 13, 2024
Authored by David Rolnick, Jonathan Hayase, Eric Wallace, Nicholas Carlini, Arthur Conmy, Thomas Steinke, Matthew Jagielski, Florian Tramer, Krishnamurthy Dvijotham, Daniel Paleka, Katherine Lee, Milad Nasr, A. Feder Cooper

In this whitepaper, the authors introduce the first model-stealing attack that extracts precise, nontrivial information from black-box production language models like OpenAI's ChatGPT or Google's PaLM-2. Specifically, their attack recovers the embedding projection layer (up to symmetries) of a transformer model, given typical API access. For under $20 USD, their attack extracts the entire projection matrix of OpenAI's ada and babbage language models. They thereby confirm, for the first time, that these black-box models have a hidden dimension of 1024 and 2048, respectively. They also recover the exact hidden dimension size of the gpt-3.5-turbo model, and estimate it would cost under $2,000 in queries to recover the entire projection matrix. They conclude with potential defenses and mitigations, and discuss the implications of possible future work that could extend this attack.

tags | exploit, paper, vulnerability
SHA-256 | 35bb26fb1fe58d91b595fbecc219b129076e6cc3ae746288dc27c6fa0d128e6a
Compromising Industrial Processes Using Web-Based Programmable Logic Controller Malware
Posted Mar 4, 2024
Authored by Raheem Beyah, Ryan Pickren, Tohid Shekari, Saman Zonouz

This is an interesting whitepaper called Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware. The authors present a novel approach to developing programmable logic controller (PLC) malware that proves to be more flexible, resilient, and impactful than current strategies.

tags | paper, web
SHA-256 | 741326e4fbc51ab41e106a049572fa380ad7b01037f9e364be260067feb5194b
NFC Relay Attack On Tesla Model Y
Posted Feb 21, 2024
Authored by Josep Pi Rodriguez | Site ioactive.com

This paper will walk you through the proof-of-concept and technical details of exploitation for IOActive's recent NFC relay attack on the newest Tesla vehicle, the Model Y. To successfully carry out the attack, IOActive reverse-engineered the NFC protocol Tesla uses between the NFC card and the vehicle, and they then created custom firmware modifications that allowed a Proxmark RDV4.0 device to relay NFC communications over Bluetooth/Wi-Fi using the Proxmark's BlueShark module.

tags | paper, protocol, wireless
SHA-256 | 1b2f050c027e1bfe9702c6a2a927a78ccba6ef0043e76bbe3a63de1a54eaecc8
How To Install And Use Metasploit On Termux
Posted Jan 15, 2024
Authored by devil rose

Whitepaper called How To Install And Use Metasploit On Termux. Written in Arabic.

tags | paper
SHA-256 | 334302ac8df53bd30a618970bd4921ff0d15d9fb14991c99d782217efaee5098
Cybersecurity In Industry 4.0 And Smart Manufacturing
Posted Sep 25, 2023
Authored by Erhan YAZAN

Whitepaper called Cybersecurity in Industry 4.0 and Smart Manufacturing: The Rise of Security in the Age of IoT, IIoT, ICS, and SCADA. This article examines Industry 4.0's relationship with the rapidly developing technologies Internet of Things (IoT), Industrial Internet of Things (IIoT), Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) and why cyber security is important in these areas.

tags | paper
SHA-256 | 0458410365974be314b620bd7944a4541658322fd5a9cee88134e46a6317b29b
Windows API Exploitation In Real World
Posted Aug 18, 2023
Authored by Akash Sarode

This paper focuses on using Windows APIs to exploit and bypass modern day defense systems. The idea here is to understand the approach of how a modern day threat adversary would definitely help blue teamers to improve their defense mechanism. This article is useful for both blue and red teamers.

tags | paper
systems | windows
SHA-256 | a08987a70023a852cfeef5c85e21b3ba9fa78f1aa30066467583fa799fdca5e3
Introduction To Web Pentesting
Posted Aug 2, 2023
Authored by Andrey Stoykov

This archive holds a whitepaper called Introduction to Web Pentesting. It provides basic configuration for Burpsuite Proxy along with basic exploitation cross site scripting, SQL injection, cross site request forgery, and open redirects. Two copies of the whitepaper are included. One is in English and one is in Bulgarian.

tags | paper, web, xss, sql injection, csrf
SHA-256 | 1f0745a5f6bf458420ce54f01247d5149ab58cb8886e6f6c015a8dbfc0d9a6de
From RFC To RCE 16 Years Later
Posted Jul 11, 2023
Authored by Fabian Hagg | Site sec-consult.com

Whitepaper titled Everyone Knows SAP, Everyone Uses SAP, Everyone Uses RFC, No One Knows RFC: From RFC to RCE 16 Years Later.

tags | paper
SHA-256 | ec3e058c8f83be6779103d8bb8f9cdbd4b8c1663435f67a9d7c36923c7afe54a
Speculative Denial-of-Service Attacks In Ethereum
Posted Jun 19, 2023
Authored by Kaihua Qin, Liyi Zhou, Aviv Yaish, Arthur Gervais, Aviv Zohar

The expressiveness of Turing-complete blockchains implies that verifying a transaction's validity requires executing it on the current blockchain state. Transaction fees are designed to compensate actors for resources expended on transactions, but can only be charged from transactions included in blocks. In this work, the authors show that adversaries can craft malicious transactions that decouple the work imposed on blockchain actors from the compensation offered in return by introducing three attacks.

tags | paper, cryptography
SHA-256 | 68b4adbac9a02de43d43f0c0b285dc603d363d3be1f6185ba4fe1c00129c1969
A DIY Guide To Become An Alone Long Time Bughunter For Ordinary People
Posted Jun 7, 2023
Authored by j00sean

Whitepaper called Bughunter's Life-Style: A DIY guide to become an alone long time bughunter for ordinary people. Written in Spanish.

tags | paper
SHA-256 | 492728ae51fe482711c11af1be87bba75442f0506b3f42fe800bfc028dd68d50
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions With Community Driven Insights
Posted Jun 5, 2023
Authored by Sasha Romanosky, Armin Sarabi, Octavian Suciu, Ben Edwards, Jay Jacobs

In this paper, the authors present the efforts behind building a Special Interest Group (SIG) that seeks to develop a completely data-driven exploit scoring system that produces scores for all known vulnerabilities, that is freely available, and which adapts to new information.

tags | paper, vulnerability
SHA-256 | 8226a3dc718a8972e22524b28b782a704c31078e7997a2ddd07aeb9c9608798f
Not-Too-Safe Boot
Posted May 16, 2023
Authored by Zero-Day Zone | Site zerodayzone.com

In this paper, the authors provide an in-depth analysis of the Not-Too-Safe Boot technique, which has been designed to bypass Endpoint Security Solutions like antivirus (AV), endpoint detection and response (EDR) and anti-tampering mechanisms remotely. This method builds on a local execution technique first published in 2007 and later utilized in a real world scenario by a ransomware in 2019.

tags | paper, local
SHA-256 | 4ab12a59151aa94280a3b9d4b96f18a83bea50df9c1d7059e19c8266fbd31001
Anomaly Detection In Bank Transactions Using Machine Learning
Posted Apr 27, 2023
Authored by Dr Rachna Jain, Sarthak Deshwal

This whitepaper illustrates different machine learning techniques for anomaly detection relating to bank transactions.

tags | paper
SHA-256 | 7c0d7aa12a9030c384da45dec3261c2fd038115e1291526f413603a7bf272956
Breaking A Fifth-Order Masked Implementation Of CRYSTALS-Kyber By Copy-Paste
Posted Feb 28, 2023
Authored by Kalle Ngo, Joel Gartner, Elena Dubrova

CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key encapsulation mechanism to be standardized. It is also included in the NSA's suite of cryptographic algorithms recommended for national security systems. This makes it important to evaluate the resistance of CRYSTALS-Kyber’s implementations to side-channel attacks. The unprotected and first-order masked software implementations have been already analysed. In this paper, they present deep learning-based message recovery attacks on the ω-order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU for ω ≤ 5. The main contribution is a new neural network training method called recursive learning. In the attack on an ω-order masked implementation, they start training from an artificially constructed neural network M ω whose weights are partly copied from a model M ω−1 trained on the (ω − 1)-order masked implementation, and then extended to one more share. Such a method allows them to train neural networks that can recover a message bit with the probability above 99% from high-order masked implementations.

tags | paper, cryptography
SHA-256 | bb8f1a666a9bb3b7ef38e7e61e8980c7e3efb86a13dead4ae283a439aa94aded
Broadcast Signal Intrusion - Hacking Radio Stations
Posted Jan 30, 2023
Authored by LiquidWorm | Site zeroscience.mk

This paper goes over common components of broadcast systems, how hackers take advantage of them, and discusses some of the vulnerabilities discovered.

tags | exploit, paper, vulnerability
SHA-256 | 1467a96747d9321ba7a659e074789337bc6efc1d4621b6ec26b5fdf38e1ca678
Wordfence 2022 State Of WordPress Security
Posted Jan 25, 2023
Authored by Ramuel Gall | Site wordfence.com

The Wordfence Threat Intelligence team has released their 2022 State of WordPress Security report. In the report, they look at changes in the threat landscape, analyze impactful trends, and provide recommendations based on their findings.

tags | paper
SHA-256 | 833a6664e11b54321c4268553ac08e81c3b99e65165b4e44d62207f09cc2fb5c
Acunetix Vulnweb Solutions Handbook
Posted Jan 9, 2023
Authored by Ismail Tasdelen

In this paper, the author subjects the vulnerable web application vulnweb.com, developed by Acunetix, to security tests. Acunetix is a web application where we can perform legal penetration tests. The author discusses how to infiltrate the target system by acting as a real hacker through this application. Written in Turkish.

tags | paper, web
SHA-256 | 9452d8ba127e646598688770379f1d68ad85c10e81be8c7238597d9d656014c1
Everything About The Secure Software Development Process
Posted Jan 9, 2023
Authored by Ismail Tasdelen

This is a brief whitepaper that discusses some basic fundamentals for approaching secure design of an application.

tags | paper
SHA-256 | c962e90a506a04f9658f44421b9bf8e4b0339a1755b66c5c193c109f722ea574
PatrIoT: Practical And Agile Threat Research For IoT
Posted Nov 18, 2022
Authored by Emre Suren, Robert Lagerstrom, Fredrik Heiding, Johannes Olegard | Site doi.org

PatrIoT provides a four-stage IoT vulnerability research methodology built on top of four key elements: logical attack surface decomposition, compilation of top 100 weaknesses, lightweight risk scoring, and step-by-step penetration testing guidelines. The proposed methodology is evaluated with multiple IoT products. The results indicate that PatrIoT allows cyber security practitioners without much experience to advance vulnerability research activities quickly and reduces the risk of critical IoT penetration testing steps being overlooked.

tags | paper
SHA-256 | 7ef04fa8b69b383da473db2f732cbb05957268406e540aab12aa566dc3408119
Page 1 of 46
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close