exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Pierre BETOUIN

Email addresspierre.betouin at security-labs.org
First Active2003-10-30
Last Active2006-10-03
Linux_Memory_Tools-0.2.tar.gz
Posted Oct 3, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

Linux Memory tools are a set of Linux tools (Python, C and ASM) which aim is to facilitate exploit development. These tools can be used to dump process memory, search for patterns and quickly find OPCODEs location addresses (instructions and mnemonics are functional but still in development). OPCODE search is possible on an instant memory snapshot or using a file dump. These tools are been quickly coded and should be considered as helpful scripts. Return addresses or shellcode locations can be found instantly.

tags | shellcode, python
systems | linux
SHA-256 | b563de74e1cda35f782a23fd14e98e36f0b0c04030335f5778d239a1c883e3e3
155022006-nokia_n70.txt
Posted Feb 25, 2006
Authored by Pierre BETOUIN | Site secuobs.com

The Bluetooth stack on Nokia N70 cellular phones is susceptible to a remote denial of service attack.

tags | exploit, remote, denial of service
SHA-256 | 88e56cf63c296d16b4bfd3dbb4bd7d0257aec42cb75ca655864e91235890c7c1
bluetooth6.c
Posted Feb 8, 2006
Authored by Pierre BETOUIN

Proof of concept exploit that resets Sony/Ericsson phones via a flaw in Bluetooth.

tags | exploit, proof of concept
SHA-256 | 69cb4697fe7ae13e375c9aafe468cf4269b76c5f26cdea0ba16392f54d714f4c
bss-0.6.tar.gz
Posted Feb 7, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

BSS (Bluetooth Stack Smasher) is a L2CAP layer fuzzer designed to assess the security of Bluetooth enabled devices by sending malicious packets.

tags | fuzzer
SHA-256 | aaba600425bcd01257183c65b4aa46278664ad27a4f671b325327a8cabb77e48
dnsa-0.6-ng.tar.gz
Posted Jul 23, 2005
Authored by Pierre BETOUIN | Site packetfactory.net

DNSA is an auditing tool which aim is to provide a simple way to pentest DNS servers and perform DNS ID Spoofing.

Changes: This new version includes wireless support using 2 cards (one monitoring, the other injecting packets).
tags | spoof
systems | unix
SHA-256 | 4492a671fe86808e05422ce270c84c0983ef784b014d88e98e3aee15d5a64ca2
DNS Auditor 0.4
Posted Oct 30, 2003
Authored by Pierre BETOUIN | Site packetfactory.net

DNS Auditor is a tool which checks for DNS security. Looks for DNS cache poisoning (using additional RR), DNS ID Spoofing, and more. More information in a related paper is available here.

tags | spoof
systems | unix
SHA-256 | 832c63102968839f32aa3a17a7cc29f67bb699940862db19e43e1130efd01dc4
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close