exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Pierre BETOUIN

Email addresspierre.betouin at security-labs.org
First Active2003-10-30
Last Active2006-10-03
Linux_Memory_Tools-0.2.tar.gz
Posted Oct 3, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

Linux Memory tools are a set of Linux tools (Python, C and ASM) which aim is to facilitate exploit development. These tools can be used to dump process memory, search for patterns and quickly find OPCODEs location addresses (instructions and mnemonics are functional but still in development). OPCODE search is possible on an instant memory snapshot or using a file dump. These tools are been quickly coded and should be considered as helpful scripts. Return addresses or shellcode locations can be found instantly.

tags | shellcode, python
systems | linux
SHA-256 | b563de74e1cda35f782a23fd14e98e36f0b0c04030335f5778d239a1c883e3e3
155022006-nokia_n70.txt
Posted Feb 25, 2006
Authored by Pierre BETOUIN | Site secuobs.com

The Bluetooth stack on Nokia N70 cellular phones is susceptible to a remote denial of service attack.

tags | exploit, remote, denial of service
SHA-256 | 88e56cf63c296d16b4bfd3dbb4bd7d0257aec42cb75ca655864e91235890c7c1
bluetooth6.c
Posted Feb 8, 2006
Authored by Pierre BETOUIN

Proof of concept exploit that resets Sony/Ericsson phones via a flaw in Bluetooth.

tags | exploit, proof of concept
SHA-256 | 69cb4697fe7ae13e375c9aafe468cf4269b76c5f26cdea0ba16392f54d714f4c
bss-0.6.tar.gz
Posted Feb 7, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

BSS (Bluetooth Stack Smasher) is a L2CAP layer fuzzer designed to assess the security of Bluetooth enabled devices by sending malicious packets.

tags | fuzzer
SHA-256 | aaba600425bcd01257183c65b4aa46278664ad27a4f671b325327a8cabb77e48
dnsa-0.6-ng.tar.gz
Posted Jul 23, 2005
Authored by Pierre BETOUIN | Site packetfactory.net

DNSA is an auditing tool which aim is to provide a simple way to pentest DNS servers and perform DNS ID Spoofing.

Changes: This new version includes wireless support using 2 cards (one monitoring, the other injecting packets).
tags | spoof
systems | unix
SHA-256 | 4492a671fe86808e05422ce270c84c0983ef784b014d88e98e3aee15d5a64ca2
DNS Auditor 0.4
Posted Oct 30, 2003
Authored by Pierre BETOUIN | Site packetfactory.net

DNS Auditor is a tool which checks for DNS security. Looks for DNS cache poisoning (using additional RR), DNS ID Spoofing, and more. More information in a related paper is available here.

tags | spoof
systems | unix
SHA-256 | 832c63102968839f32aa3a17a7cc29f67bb699940862db19e43e1130efd01dc4
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close