exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Brad Antoniewicz

Email addressbrad.antoniewicz at foundstone.com
First Active2008-02-23
Last Active2011-01-20
ProxBrute - Taking Proxcard Cloning To The Next Level
Posted Jan 20, 2011
Authored by Brad Antoniewicz

This paper describes the basic process of using the proxmark3 to clone Proxcards and then introduces ProxBrute, a new tool for brute forcing valid proxcard values.

tags | paper
SHA-256 | 2d0fd9f79fb7dbb051b1d0d095dea1dd28993622fb07d852518c7f7100181d3b
ProxBrute 0.3
Posted Jan 12, 2011
Authored by Brad Antoniewicz

ProxBrute is a custom firmware written for the proxmark3. It extends the currently available firmware (revision 465) to support brute force attacks against proximity card access control systems. This version of ProxBrute requires the knowledge of a [once] valid tag value to vertically or horizontally escalate the tag's privileges.

tags | cracker
systems | unix
SHA-256 | a155a9dd000312c20ecbe6ca6bab1bc991183e9dea73578a76754b148ab1332a
ntop 3.3.10 Denial Of Service
Posted Aug 18, 2009
Authored by Brad Antoniewicz

ntop versions 3.3.10 and below suffer from a basic authentication null pointer denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2009-2732
SHA-256 | aad3f03488f5dcebf8a3f95a8a2dd8fd1ea219bc8c5bf2382388fed6da94eb39
Defeating The iPhone Passcode
Posted Mar 3, 2009
Authored by Brad Antoniewicz

Whitepaper called Defeating the iPhone Passcode.

tags | telephony
systems | apple, iphone
SHA-256 | 4057ba42acd5baab592ee9f0a9a299e6dee396369e8d1034ae8a86a9271d0b89
firmchannel-xss.txt
Posted Nov 5, 2008
Authored by Brad Antoniewicz

FirmChannel Digital Signage version 3.24 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2008-4931
SHA-256 | bcb35fe0a2c40a10309b3795346c219cd63abc3846b20cc4b2ddf929a5a51479
hammer-traversal.txt
Posted Oct 6, 2008
Authored by Brad Antoniewicz

Hammer Software MetaGauge version 1.0.0.17 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2008-4421
SHA-256 | b7c38dcf52a5a106beaa86d8e29567cd70e6d8a1d3f7b880295137d31cfcfc8e
ciscobbsm-xss.txt
Posted May 13, 2008
Authored by Brad Antoniewicz

Cisco BBSM Captive Portal suffers from a cross site scripting vulnerability.

tags | exploit, xss
systems | cisco
advisories | CVE-2008-2165
SHA-256 | 3678e1a7be3cdc235260ae444cf866aabaab44bd2264b0c8d01b9db67da91971
swiki-xss.txt
Posted Apr 9, 2008
Authored by Brad Antoniewicz

Swiki version 1.5 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9ab010fffeaf6a43e91740ca213df427dbb5e10d74dc70052a56e02070d5a49c
beehive-hardcode.txt
Posted Mar 3, 2008
Authored by Brad Antoniewicz

The Beehive/SendFile.NET Secure File Transfer appliance appears to have credentials hardcoded within the outboxWriteUnsent() function of the FTPThread.class file of SendFile.jar.

tags | advisory
SHA-256 | c8a5ae71651f04dc4e1c0bb97062c1dfd25c5c55219dfbc64c34da8a90a332be
802.11Attacks.pdf
Posted Feb 23, 2008
Authored by Brad Antoniewicz

This paper provides a step by step walk-through of popular wireless attacks. It also describes how to perform the new AP Impersonation attack using FreeRADIUS-WPE, the new EAP-MD5 Brute force attack, and a variety of other not-so documented attacks.

tags | paper
SHA-256 | 42a7ff7f286496f8417cfa70abc4a67d3d2149f5bb50e623e09c0ea73a33a0cb
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close