Archive for Hacking papers

How To Exploit A Format String Vulnerability

I was writing a paper on format string vulnerabilities, but while doing some additional research i’ve found the following paper which already explains it all, so i decided to stop writing about format string vulnerabilities and put a link to this paper here:
here’s the paper: /http://doc.bughunter.net/format-string/exploit-fs.html
Exploiting Format String Vulnerabilities
Written by : scut / team teso
* [...]

Share and Enjoy:

CR-LF injection(carriage return- line feed injection)

CRLF injection:CR (Carriage Return) and LF (Line Feed) are traditionally commands you may recognize from using typewriters and printers. Carriage Return would send the print head back to the start of the current line, whilst Line Feed moved the paper up one line. So, after completing one line of typing/printing both CR and LF commands [...]

Share and Enjoy:

[PAPER] Self spreading Malware for Soho Routers

_ABSTRACT_
So called Soho (Small home and office) routers have become extremely
popular in the last few years. While the good guys where busy trying to prevent
malware from infiltrating their desktop systems, the bad guys had gone one step
ahead of the game and started to experiment with these devices.
Close to nobody pays attention to the security of [...]

Share and Enjoy:

Assault On Oracle Pl/sql - Injection

In this paper I will be discussing Injection into Oracle PL/SQL database objects. Like many vulnerabilities PL/SQL Injection is possible because user input is not validated or in other cases the validation is not sufficient and can be bypassed.
This paper will cover a bit of Information on Oracle Application Express (APEX) which I will be [...]

Share and Enjoy: