Welcome to SecurityDocs

A collection of 8,050 IT security white papers, carefully curated by professionals like yourself

Scanning Windows Deeper With the Nmap Scanning Engine

by Ron Bowes

With modern script libraries, which were written by the author, the Nmap Scripting Engine (NSE) has the ability to establish a null or authenticated session with all modern versions of Windows. By leveraging these sessions, scripts have the ability to probe and explore Windows systems in great depth, providing an attacker with invaluable information about the server. This paper will look at how SMB and Microsoft RPC services work, how the Nmap scripts take advantage of the services, what chec...

Nov. 29, 2017 0 comments 18 minute read Pen Testing & Audits

Certified Ethical Hacker - Part 6-1 Malware Threat

by Riazul H. Rozen

Malwares are programs written for the intention of being malicious. They cause damage to the systems, by giving the programmer limited or full access to the target system. These malware can be introduced into the system through various means; removable devices, fake programs, downloading or opening unsecured sites, instant messenger etc.

Dec. 6, 2017 0 comments 3 minute read Pen Testing & Audits

A penetration tester’s guide to sub-domain enumeration

by Bharath

As a penetration tester or a bug bounty hunter, most of the times you are given a single domain or a set of domains when you start a security assessment. You’ll have to perform extensive reconnaissance to find interesting assets like servers, web applications, domains that belong to the target organisation so that you can increase your chances of finding vulnerabilities.

Nov. 26, 2017 0 comments blog.appsecco.com Pen Testing & Audits

Leading the Blind to Light! - A Chain to RCE

by Andy Gill

The chain of issues started with an outdated instance of Oracle E-Business Suite which has many publicly disclosed issues, two of which were an authentication bypass & a blind XXE vulnerablity. For anyone who's ever come across Oracle EBS you'll know if it's outdated often it'll be riddled with holes, which is great from a bug bounty & pentesting perspective but not so great for companies who are using it.

Nov. 24, 2017 0 comments blog.zsec.uk Pen Testing & Audits

Metasploitable Walkthrough: An Exploitation Guide

Metasploitable is an Ubuntu 8.04 server install on a VMWare 6.5 image with a number of vulnerable packages included, which can be run on most virtualization software. You can grab your copy at Vulnhub – Metasploitable I used Kali Linux for attacking and VirtualBox for virtualization.

Nov. 24, 2017 0 comments tehaurum.wordpress.com Pen Testing & Audits

Burp Suite Tutorial Web Penetration Tool Kit

Burp Suite is a web application penetration testers Dream tool and the most powerful tool out there on the internet can it can be used to cover everything full in depth that you ever wanted. So i will be my best to thoroughly explain all the details as there are a lot of things to cover. Here is a quick list of Burp Suite components:

Nov. 24, 2017 0 comments securitytraning.com Pen Testing & Audits

Burp Suite Tutorial – Web Application Penetration Testing

by Royce Davis

Burp Suite from Portswigger is one of my favorite tools to use when performing a Web Penetration Test. The following is a step-by-step Burp Suite Tutorial. I will demonstrate how to properly configure and utilize many of Burp Suite’s features. After reading this, you should be able to perform a thorough web penetration test. This will be the first in a two-part article series.

Nov. 24, 2017 0 comments www.pentestgeek.com Pen Testing & Audits

Spoofing Attacks DHCP Server Spoofing

by Alok

One of the Layer 2 attacks inside a LAN network that is very dangerous for information privacy and LAN integrity is spoofing attack. This is special kind of attack where attacker can gain access to network traffic by spoofing responses that would be sent by a valid DHCP server. This attack is using a technique ARP spoofing, also called ARP cache poisoning or ARP poison routing (APR) that is a simple LAN attack technique. ARP spoofing will allow an attacker to intercept frames on a LAN, modif...

Nov. 24, 2017 0 comments learningnetwork.cisco.com Pen Testing & Audits

How I Hacked 40 Websites in 7 minutes

by Georgios Konstantopoulos

Last summer I started learning about information security and hacking. Over the last year I’ve played in various wargames, capture the flag and penetration testing simulations, continuously improving my hacking skills and learning new things about ‘how to make computers deviate from their expected behavior’. Long story short, my experience was always limited to simulated environments, and since I consider myself a white-hat hacker (aka one of the good guys) I never stuck my nose into other p...

Nov. 24, 2017 0 comments hackernoon.com Pen Testing & Audits

Understanding Guide to Nmap Firewall Scan

by Raj Chandel

Several times you might have used NMAP to performing Network scanning for enumerating active Port services of target machine but in some scenario it is not possible to perform scanning with help of basic scan method especially in case of firewall filter. Today we are going to demonstrate “Nmap firewall scan” by making use of Iptable rules and try to bypass firewall filter to perform NMAP Advance scanning.

Nov. 23, 2017 0 comments www.hackingarticles.in Pen Testing & Audits

“Evil Twin” Wireless Access Point Attack

Wireless is a useful technology that has been quickly growing for years and is now widespread almost everywhere we go. It enables users and their devices to simply and wirelessly reach the internet. Despite the dependence on this technology that has appeared in recent years, the normal user is unaware of how it works and …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Microsoft Office Dynamic Data Exchange(DDE) attacks

Microsoft Office programs are widely exploited by malware authors by embedding links, objects, and other payloads. Its effects often depend on how the user will interact with documents. Customarily embedded payloads are executed when the user enables macros, but this is not the only way to infect users. There are other methods as well which …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Proteus: 1 – CTF Walkthrough

Proteus is a relatively new machine that came on VulnHub. Created by Ivanvza, it surfaced on June 7th, 2017. It can be downloaded from https://www.vulnhub.com/entry/proteus-1,193/ The objective is to get root privileges and get the flag. Downloaded and fired up, it presents with a login screen with no other information at all apart from telling …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Penetration Testing: Data Mining

Data mining is the computing process of finding patterns in large data collections including methods at the intersection of machine learning, statistics, and database systems. A basic process where intelligent methods are used to extract data patterns. In a penetration testing, the overall purpose is to show the impact of the vulnerability, and this can …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Exploit Pack - Penetration Testing Framework

Exploit Pack has been designed by an experienced team of software developers and exploit writers to automate processes so penetration testers can focus on what’s really important. The threat. This blend of software engineers and subject matter experts provides an unique advantage by combining technical know-how with true insight into the problem set, resulting in …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

OWASP ZAP 2.6.0 - Penetration Testing Tool for Testing Web Applications

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits


Like buffer overflows in system code, injection attacks have been a dangerous problem in the web world for many years, and like buffer overflows, there are several different types of code injection attacks. Most recent web applications depend on the use of interpreted programming languages and back-end databases to collect data and generate dynamically driven …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits


XSS is the method of injecting scripts into a web application. The injected script can be stored on the original web page and run or processed by each browser that visits the web page. This process occurs as if the injected script was really part of the original code. XSS is different from many other …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

SQLiv - Massive SQL Injection Vulnerability Scanner

Massive SQL injection vulnerability scanner. Features multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning by providing specific domain (with crawling) reverse domain scanning both SQLi scanning and domain info checking are done in multiprocessing so the script is super fast at scanning many urls quick tutorial & screenshots are …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Brute Force and Dictionary Attacks

Brute force and dictionary attacks are usually presented together because they are made against the same entity: passwords. Each kind of attack can be waged against a password database file or upon an active logon prompt. A brute force attack is a try to find passwords for user accounts by systematically trying every potential combination …

Nov. 23, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits


We'll send you a carefully curated list of the best IT security white papers to your mailbox every Friday.