exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Brad Antoniewicz

Email addressbrad.antoniewicz at foundstone.com
First Active2008-02-23
Last Active2011-01-20
ProxBrute - Taking Proxcard Cloning To The Next Level
Posted Jan 20, 2011
Authored by Brad Antoniewicz

This paper describes the basic process of using the proxmark3 to clone Proxcards and then introduces ProxBrute, a new tool for brute forcing valid proxcard values.

tags | paper
SHA-256 | 2d0fd9f79fb7dbb051b1d0d095dea1dd28993622fb07d852518c7f7100181d3b
ProxBrute 0.3
Posted Jan 12, 2011
Authored by Brad Antoniewicz

ProxBrute is a custom firmware written for the proxmark3. It extends the currently available firmware (revision 465) to support brute force attacks against proximity card access control systems. This version of ProxBrute requires the knowledge of a [once] valid tag value to vertically or horizontally escalate the tag's privileges.

tags | cracker
systems | unix
SHA-256 | a155a9dd000312c20ecbe6ca6bab1bc991183e9dea73578a76754b148ab1332a
ntop 3.3.10 Denial Of Service
Posted Aug 18, 2009
Authored by Brad Antoniewicz

ntop versions 3.3.10 and below suffer from a basic authentication null pointer denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2009-2732
SHA-256 | aad3f03488f5dcebf8a3f95a8a2dd8fd1ea219bc8c5bf2382388fed6da94eb39
Defeating The iPhone Passcode
Posted Mar 3, 2009
Authored by Brad Antoniewicz

Whitepaper called Defeating the iPhone Passcode.

tags | telephony
systems | apple, iphone
SHA-256 | 4057ba42acd5baab592ee9f0a9a299e6dee396369e8d1034ae8a86a9271d0b89
firmchannel-xss.txt
Posted Nov 5, 2008
Authored by Brad Antoniewicz

FirmChannel Digital Signage version 3.24 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2008-4931
SHA-256 | bcb35fe0a2c40a10309b3795346c219cd63abc3846b20cc4b2ddf929a5a51479
hammer-traversal.txt
Posted Oct 6, 2008
Authored by Brad Antoniewicz

Hammer Software MetaGauge version 1.0.0.17 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2008-4421
SHA-256 | b7c38dcf52a5a106beaa86d8e29567cd70e6d8a1d3f7b880295137d31cfcfc8e
ciscobbsm-xss.txt
Posted May 13, 2008
Authored by Brad Antoniewicz

Cisco BBSM Captive Portal suffers from a cross site scripting vulnerability.

tags | exploit, xss
systems | cisco
advisories | CVE-2008-2165
SHA-256 | 3678e1a7be3cdc235260ae444cf866aabaab44bd2264b0c8d01b9db67da91971
swiki-xss.txt
Posted Apr 9, 2008
Authored by Brad Antoniewicz

Swiki version 1.5 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9ab010fffeaf6a43e91740ca213df427dbb5e10d74dc70052a56e02070d5a49c
beehive-hardcode.txt
Posted Mar 3, 2008
Authored by Brad Antoniewicz

The Beehive/SendFile.NET Secure File Transfer appliance appears to have credentials hardcoded within the outboxWriteUnsent() function of the FTPThread.class file of SendFile.jar.

tags | advisory
SHA-256 | c8a5ae71651f04dc4e1c0bb97062c1dfd25c5c55219dfbc64c34da8a90a332be
802.11Attacks.pdf
Posted Feb 23, 2008
Authored by Brad Antoniewicz

This paper provides a step by step walk-through of popular wireless attacks. It also describes how to perform the new AP Impersonation attack using FreeRADIUS-WPE, the new EAP-MD5 Brute force attack, and a variety of other not-so documented attacks.

tags | paper
SHA-256 | 42a7ff7f286496f8417cfa70abc4a67d3d2149f5bb50e623e09c0ea73a33a0cb
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close