Exploitation

Tue
14
Jul

HackingTeam's Remote Control System Whitepapers

Contributed by the anonymous hackers who exposed the HackingTeam

Here is a collection of papers created by the HackingTeam regarding Remote Control System. Remote Control System (RCS) is a solution designed to evade encryption by means of an agent directly installed on the device to monitor. Evidence collection on monitored devices is stealth and transmission of collected data from the device to the RCS server is encrypted and untraceable.

RCS installations are deployed at the Customer’s premises, thus guaranteeing to the Customer total control on its operations and security.

This document is in PDF format. To view it click here.

Tue
14
Jul

Hacking Team Project X

HackingTeam

Contributed by the anonymous group who hacked the hackingteam

I came across this presentation created by the HackingTeam that was publically released on July 6, 2015. It contains the documented thought process of how they were going to attempt to break in to TOR. Experts place the date of this attempt around the beginning of 2015. Enjoy and learn!

This document is in PDF format. To view it click here.

Wed
01
Jul

Netcat for the Masses

Contributed by Dean De Beer and extracted from the old Infosecwriters archives, but still relevant today.

Having had numerous people recently ask me about the various uses for Netcat I decided to put together a document showing a few handy uses for good ol' Netcat. Netcat has been described as telnet on steroids or a Swiss army knife, both excellent descriptions for this versatile little tool.

Originally written by Hobbit for Linux, Weld Pond later ported it to Windows. In essence it is a tool that reads and writes data across a network connection, using the TCP or UDP Protocol. For the orginal, detailed technical description of Netcat visit: http://www.vulnwatch.org/netcat/

This document is in PDF format. To view it click here.

Wed
01
Jul

The Basics of Shellcoding

Contributed by Angelo Rosiello many years ago (2004) from the old Infosecwriters archives.

A shellcode is a group of instructions which can be executed while another program is running. Nowadays lots of examples show how a shellcode can be uxecuted while an application is running and its followings is proposed us by vulnerabilities' exploits. In order to get advantage from a vulnerability it is indispensable to inject a shellcode because we have to get the control of a running application.

The goal of this article is not to explain all the possibilities of injecting a shellcode developed during last years, but to analyze and understand its essence.

This document is in PDF format. To view it click here.

Wed
24
Jun

HTTP RESPONSE SPLITTING

Contributed by Diabolic Crab from many years ago from the old Infosecwriters archives

This is a fairly new web application vulnerability. It can be used for the following purposes.

Cross site scripting (XSS): This is a very common and old form of vulnerability where it allows the user execution of html or java script code which can then lead to the hijacking of the user's cookie or session. They even allow _javascript code execution and maybe used to exploit other vulnerabilities in browsers with more anonymity.

Pages

Subscribe to RSS - Exploitation