Welcome to SecurityDocs

A collection of 8,047 IT security white papers, carefully curated by professionals like yourself

Scanning Windows Deeper With the Nmap Scanning Engine

by Ron Bowes

With modern script libraries, which were written by the author, the Nmap Scripting Engine (NSE) has the ability to establish a null or authenticated session with all modern versions of Windows. By leveraging these sessions, scripts have the ability to probe and explore Windows systems in great depth, providing an attacker with invaluable information about the server. This paper will look at how SMB and Microsoft RPC services work, how the Nmap scripts take advantage of the services, what chec...

Nov. 29, 2017 0 comments 18 minute read Pen Testing & Audits

Security issues against DNS

by Craig S. Wright

There are many ways to attack DNS. Attacks range from denials of service (DOS) to man in the middle (MiTM) to spoofing. The recent inclusion of Unicode entries into DNS may mean a site that looks like “microsoft.com” could exist but actually point to something else. Perhaps the o's in Microsoft would be Cyrillic instead of Latin. This paper will look at the issues facing DNS as well as conduct an analysis of the existing DNS infrastructure to assess its state and weaknesses. This process will...

Nov. 24, 2017 1 comment 41 minute read Apps & Hardening

Certified Ethical Hacker - Part 5-2 - System Hacking

by Riazul H. Rozen

Gaining administrative privilege is when the attacker bypasses the normal levels of security and goes on to gain administrative access to the system. The attacker takes advantage of the security flaws or programming problems in the system. The administrative privileges consist of sensitive information and a privileged attack could devise a number of means such as deleting and installing malicious files. There are two types of privilege escalation, such as vertical and horizontal privilege....

Nov. 22, 2017 2 comments 3 minute read Certifications

Certified Ethical Hacker - Part 12-1 - Hacking Web Applications

by Riazul H. Rozen

Hacking is an intricate process, and as such it encompasses a whole range of methods, ranging from determining the victim, discovering system vulnerabilities for exploitation and finally the hacking process methodology. This article focuses on the pre-process as well as the major process.

Feb. 19, 2018 0 comments 3 minute read Certifications

Certified Ethical Hacker - Part 11-2 - Hacking Web Server

by Riazul H. Rozen

Attackers use tools such as Netcraft, httprecon, and ID serve to carry out footprinting exercises. The question then is what is footprinting? Footprinting is a method used by attackers to retrieve valuable information from their target systems. Information ranging from account details, operating systems, server names, database schema details and software versions can be gleaned from this process.

Jan. 31, 2018 0 comments 3 minute read Certifications

Certified Ethical Hacker - Part 11-1 - Hacking Web Server

by Riazul H. Rozen

hen attackers take advantage of these systems, a good number of negative influences could occur. From website defacement to data theft, modification, and compromise of user accounts. Attackers could also gain root access to other servers or applications.

Jan. 31, 2018 0 comments 3 minute read Certifications

Certified Ethical Hacker - Part 10-2 - Session Hijacking

by Riazul H. Rozen

Apart from the active and passive hijacking classifications, which true to their name depict the level of involvement of an attacker to the system, there are level based hijackings that are peculiar to the network and applications of the target system.

Jan. 30, 2018 0 comments 4 minute read Certifications

Certified Ethical Hacker - Part 10-1 - Session Hijacking

by Riazul H. Rozen

A session Hijacking occurs when the attacker takes over the TCP communication. This process is made feasible, as a result of the authentication process which happens only at the beginning of the session. Attackers are able to gather personal information which in turn could pose a serious problem to the victim, by stealing a legitimate session ID and validating themselves with the server.

Jan. 30, 2018 0 comments 3 minute read Certifications

Certified Ethical Hacker - Part 9 - Denial of Service

by Riazul H. Rozen

When an attacker attempts to overload a target system with fake service requests or traffic, the outcome of a successful attack is called a Denial of Service Attack.

Jan. 30, 2018 0 comments 4 minute read Certifications

Certified Ethical Hacker - Part 8 - Social Engineering

by Riazul H. Rozen

Social engineering is a method used by attackers to gather valuable information form susceptible individuals. Personnel such as system administrators and desk officers are usually targeted.

Jan. 3, 2018 0 comments 4 minute read Certifications

Certified Ethical Hacker - Part 7-1 Sniffing

by Riazul H. Rozen

Sniffing is usually done in the data link layer in the OSI. This is somewhat beneficial because the upper layers are unable to detect sniffing on the lower layer. Sniffing can be carried out using a hardware protocol analyser. This monitors and discovers signals, without changing information in the transmitted traffic.

Dec. 15, 2017 0 comments 3 minute read Certifications

Certified Ethical Hacker - Part 6-2 Malware Threat

by Riazul H. Rozen

Viruses are only inactive, as long as the target host has not performed any action with regards the infected file. When the virus is written and sent to the target system, it regenerates itself and attaches itself to other files.

Dec. 7, 2017 0 comments 3 minute read Certifications

Certified Ethical Hacker - Part 6-1 Malware Threat

by Riazul H. Rozen

Malwares are programs written for the intention of being malicious. They cause damage to the systems, by giving the programmer limited or full access to the target system. These malware can be introduced into the system through various means; removable devices, fake programs, downloading or opening unsecured sites, instant messenger etc.

Dec. 6, 2017 0 comments 3 minute read Pen Testing & Audits

Web Malware 101

by Anish

Lets see an example of obfuscated script. The target here is Storm worm. This worm started spreading in January 2007. It used e-mail messages with subject lines about weather disasters in Europe, hence the name. Lets inspect the javascript which has the obfuscation function shall we.

Nov. 29, 2017 0 comments malwarecrypt.blogspot.mx Detection & Response

A penetration tester’s guide to sub-domain enumeration

by Bharath

As a penetration tester or a bug bounty hunter, most of the times you are given a single domain or a set of domains when you start a security assessment. You’ll have to perform extensive reconnaissance to find interesting assets like servers, web applications, domains that belong to the target organisation so that you can increase your chances of finding vulnerabilities.

Nov. 26, 2017 0 comments blog.appsecco.com Pen Testing & Audits

XSS (Cross Site Scripting) Prevention Cheat Shee

This article provides a simple positive model for preventing XSS using output escaping/encoding properly. While there are a huge number of XSS attack vectors, following a few simple rules can completely defend against this serious attack. This article does not explore the technical or business impact of XSS. Suffice it to say that it can lead to an attacker gaining the ability to do anything a victim can do through their browser. Both reflected and stored XSS can be addressed by performing...

Nov. 25, 2017 0 comments www.owasp.org Apps & Hardening

Illusion Gap - Antivirus Bypass

by Kasif Dekel

During our research, CyberArk Labs encountered a strange behavior in the file scanning process of Windows Defender. This problem may possibly exist in other anti-viruses, which we have not yet tested. This behavior led us to investigate the Antivirus scanning process over SMB shares and the outcome is a surprising cause for concern.

Nov. 25, 2017 0 comments www.cyberark.com Detection & Response

Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. This guidance helps organizations establish information sharing goals, identify cyber threat information sources, scope information sharing activities, develop rules that control the publication and distribution of threat information, engage with existing sharing communities, and make effective use of threat information in support of the organization’s overall cyberse...

Nov. 25, 2017 0 comments nvlpubs.nist.gov Detection & Response

Six Ways to Secure APIs

by Alok Shukla

API usage in application development has become the trend of the year. Adoption of micro-services and server-less architectures have only accelerated this trend. Based on conversations with analysts and customers, we expect APIs to become the majority of web application front ends in next couple of years. Due to increased public exposure and common API front end usage, APIs have become a new attack vector for cybercriminals and can make your applications and databases vulnerable to the ful...

Nov. 24, 2017 0 comments www.imperva.com Apps & Hardening


We'll send you a carefully curated list of the best IT security white papers to your mailbox every Friday.