what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files from Max Moser

Email addressmax.moser at gmail.com
First Active2002-03-13
Last Active2014-12-14
Ekahau Real-Time Location System RC4 Cipher Stream Reuse / Weak Key Derivation
Posted Dec 14, 2014
Authored by Max Moser, David Gullasch

Ekahau Real-Time Location System suffers from RC4 cipher stream reuse and weak key derivation flaws. The message payload of the affected solution is always encrypted using the same RC4 cipher stream. When combining two encrypted messages with an XOR operation, the cipher stream will cancel out. With this, an attacker is able to recover the bitwise difference of two plain texts. The 128 bit RC4 key used in the Ekahau setup is trivially derived from the three least significant bytes of the MAC address. The key derivation scheme can be recovered from publicly available program code or any Ekahau tag's EEPROM.

tags | exploit
advisories | CVE-2014-2716
SHA-256 | a6ce7b1308744e978d9de9d7f014e08f9af93014056f5d15361dbdf486a9720c
BlackBerry Z10 Authentication Bypass
Posted Aug 13, 2014
Authored by Max Moser, David Gullasch, Martin Schobert

BlackBerry Z10 suffers from a storage and access file-exchange authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2014-2388
SHA-256 | 6ad030936de3e1297588702bfb5cc320dc713c579986b035aa88719f4f3bf757
iPhone Safari Auto-Open
Posted Jul 7, 2009
Authored by Max Moser | Site remote-exploit.org

iPhones running OS 3 have a usability feature where Safari is launched immediately when joining a network. This allows rogue access points a known vector of attack.

tags | advisory
SHA-256 | f048f1ea52e449199ae2c08e3b737c937896e873aa379fa8eee444f3b52c3198
27_Mhz_keyboard_insecurities.pdf
Posted Dec 2, 2007
Authored by Max Moser, Philipp Schrodel | Site remote-exploit.org

27 Mhz Wireless Keyboard Analysis Report aka "We know what you typed last summer".

tags | paper
SHA-256 | 4031665158f89095b76522ddf109f7e9470a039ede93a4d0567d8c5498ed3f04
busting_bluetooth_myth.pdf
Posted Apr 2, 2007
Authored by Max Moser | Site remote-exploit.org

Brief whitepaper discussing research performed analyzing whether or not a 30 dollar Bluetooth dongle could be transformed into a full blown Bluetooth sniffer.

tags | paper
SHA-256 | f3a4af82e005cae51da0d0956e317435cb453b6bea93a309c7b3d0a113cfc977
wyd-0.2.tar.gz
Posted Feb 23, 2007
Authored by Max Moser, Martin J. Muench | Site remote-exploit.org

Wyd is a password profiling tool that is able to parse different types of files and generate a wordlist out of them which can be used for a wordlist attack on passwords. It is very effective to get reasonable passwords from websites or filesystems.

tags | cracker
SHA-256 | 70085fcfa8bfff41d6b6bb4522d9437ad62262ab39fa98d3d8076d54bb06dcb9
wyd.tar.gz
Posted Oct 20, 2006
Authored by Max Moser | Site remote-exploit.org

Wyd is a tool for password profiling. The general idea is to personalize or profile the available data about a "target" person or system and generate a wordlist of possible passwords/passphrases out of available information. Instead of just using the command 'strings' to extract all the printable characters out of all type of files, we wanted to eliminate as much false-positives as possible. The goal was to exclude as much "unusable" data as possible to get an effective list of possible passwords/passphrases. It is very effective to get reasonable passwords from websites or filesystems.

tags | cracker
SHA-256 | 3581d74785a5071ea404d0bbe59de4768ac89952f157729de10a21ab0abb2277
hotspotter-0.4.tar.gz
Posted Oct 1, 2004
Authored by Max Moser, Joshua Wright | Site remote-exploit.org

Hotspotter is a utility that passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. If the probed network name matches a common hotspot name, Hotspotter will act as an access point to allow the client to authenticate and associate. Once associated, Hotspotter can be configured to run a command, possibly a script to kick off a DHCP daemon and other scanning against the new victim.

Changes: New, pre accesspoint mode scripting and bug fix.
tags | tool, wireless
systems | windows
SHA-256 | 575cd3fb0edc9d59df108628351b17282b025240555382eb2e1631f856179f28
hotspotter-0.3.tar.gz
Posted Apr 4, 2004
Authored by Max Moser, Joshua Wright | Site remote-exploit.org

Hotspotter is a utility that passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. If the probed network name matches a common hotspot name, Hotspotter will act as an access point to allow the client to authenticate and associate. Once associated, Hotspotter can be configured to run a command, possibly a script to kick off a DHCP daemon and other scanning against the new victim.

tags | tool, wireless
systems | windows
SHA-256 | 2cab48a6655bc38f9dda95aae013520c8eefeb150ff4e5f15e8d4c057170dfce
cdpsniffer-v1.0.tar.gz
Posted Sep 12, 2002
Authored by Max Moser | Site remote-exploit.org

CDPsniffer is a small perl Cisco discovery protocol (CDP) decoding sniffer. It sniffs the network traffic, picks out the CDP packets and prints out the decoded protocol contents.

tags | tool, perl, sniffer, protocol
systems | cisco
SHA-256 | b56dd366d3ff75bcbc91aede8e906e21d5092deb3490fe962f2f3869a524da01
Wellenreiter-v12.tar.gz
Posted May 24, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Added a "Wellenreiter on ipaq howto", added an export menu item to save scans as a gpsdrive waypoints file, comma delimited text file, or netstumbler format, added the possibility to force the scannerwindow to stay on one channel, and much more. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | c516ea342b2470327fe3ac93c60d52d7e904708f1d0b9311e7cf6162147c1290
Wellenreiter-v11.tar.gz
Posted Apr 25, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: GPS support has been added. It is possible to enable/disable the acoustic beacon indicator. This release uncovers non-broadcasting networks by just waiting until a probe response passes the network (someone joins the network). A new acoustic event has been added for uncovering an essid. There is massive code cleanup and speed improvements.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | 1b7fd54fe9783cb5628608cd06f03db29b2a574fe5ce177b9968b69def8f5761
Wellenreiter-v10.tar.gz
Posted Apr 15, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Cisco/Aironet , Lucent/Hermes and Prism2 cards are now supported! Cisco cards now automatically generate a random MAC for joining a network. Added large amount of documentation (READMES, FAQ's). Simplified the installation process. Removed ipaq specific code and depend now on the screen size detection.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | 15ea9497bbc295093a3cd7a2813f0cad7fe685ab4d05301b98a8db1f1684f5a5
Wellenreiter-v09.tar.gz
Posted Apr 3, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

Changes: Added the ability to add, edit and delete custom comments to each access point. Added popup menu to the detailview of an access point. Corrected the manufacturer detection. Added dumpfile support, you can now dump you whole scan to a pcap dumpfile. All captured 802.11b frames are now dumped. Added the option to disable automatic channelswitching. Modified the default startsniff command. New log window. This makes it more easier to track the timeline. Added accoutstic_events subroutine. Removed the "detected by Frametype" access points detail view.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | e29aefc4d0b5d3e41b50de9616f26d4aab71735ee8853e32525eec13011918a8
Wellenreiter-v08.tar.gz
Posted Mar 20, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

Changes: Added WEP enabled / disabled detection. WEP encrypted enabled access points now get a different icon coloring that non WEP enabled ones. Real access points got different icons than AD-Hoc stations that do the broadcasting. Added a battery monitor window. Enhanced the scanner window performance. Fixed the problem of adding of access point in the tree outside the channels.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | b40851db96e46b4817e4d858df01930ebfc9ab68ce7d8225f0429584dcf000e8
Wellenreiter-v07-alpha.tar.gz
Posted Mar 13, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | c9b6dc3395ff1b64fbe2b8c00b21bac822f84ceb255603b81ce306b90c3453cd
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close