exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Johnny Cache

First Active2004-10-13
Last Active2007-01-16
uninformed-vol6.tgz
Posted Jan 16, 2007
Authored by Matt Miller, H D Moore, Johnny Cache, Skywing, uninformed | Site uninformed.org

Uninformed is pleased to announce the release of its sixth volume. This volume includes 3 articles on reverse engineering and exploitation technology. These articles include - Engineering in Reverse: Subverting PatchGuard Version 2, Engineering in Reverse: Locreate: An Anagram for Relocate, Exploitation Technology: Exploiting 802.11 Wireless Driver Vulnerabilities on Windows. PDFs of all articles and related code are included in this tarball.

tags | vulnerability
systems | windows
SHA-256 | 77ce1bc8aec65cc4a56356bef955197cab0127a53332ee6046b934865b61016f
intel-race.txt
Posted Dec 21, 2006
Authored by Johnny Cache, Breno Silva

The Intel 2200BG card suffers from a race condition vulnerability. Proof of concept code included.

tags | exploit, proof of concept
SHA-256 | 52fece9a4bfaaa83265054f29f2318eb916e0cfd1bd0d159da6c9810cca9d699
broadcom_wifi_ssid.rb.txt
Posted Nov 14, 2006
Authored by Matt Miller, H D Moore, Johnny Cache, Chris Eagle | Site projects.info-pull.com

This Metasploit module exploits a stack overflow in the Broadcom Wireless driver that allows remote code execution in kernel mode by sending a 802.11 probe response that contains a long SSID. The target MAC address must be provided to use this exploit. The two cards tested fell into the 00:14:a5:06:XX:XX and 00:14:a4:2a:XX:XX ranges.

tags | exploit, remote, overflow, kernel, code execution
SHA-256 | 2ff6d29125b46d296be9c00aba6e22b7ec7b8b26fb33105084e75a05c8cc0a55
dlink_wifi_rates.rb.txt
Posted Nov 14, 2006
Authored by Matt Miller, H D Moore, Johnny Cache, LMH | Site projects.info-pull.com

This Metasploit module exploits a stack overflow in the A5AGU.SYS driver provided with the D-Link DWL-G132 USB wireless adapter. This stack overflow allows remote code execution in kernel mode. The stack overflow is triggered when a 802.11 Beacon frame is received that contains a long Rates information element. This exploit was tested with version 1.0.1.41 of the A5AGU.SYS driver and a D-Link DWL-G132 USB adapter (HW: A2, FW: 1.02). Newer versions of the A5AGU.SYS driver are provided with the D-Link WUA-2340 adapter and appear to resolve this flaw, but D-Link does not offer an updated driver for the DWL-G132. Since this vulnerability is exploited via beacon frames, all cards within range of the attack will be affected. The tested adapter used a MAC address in the range of 00:11:95:f2:XX:XX.

tags | exploit, remote, overflow, kernel, code execution
SHA-256 | 5245f37a2a49581c658dd9bdd9e766576bf78b633852da860acdc8bc666fa469
shadowmac-1.0.tar.gz
Posted Oct 13, 2004
Authored by Johnny Cache

shadowmac is a kernel patch for spoofing MAC addresses under Mac OS X. It works even if the device does not support the IOCTL via rewriting the MAC on the wire as packets go out and the reverse when they come in.

tags | tool, kernel, spoof
systems | unix, apple, osx
SHA-256 | 77d15ab51734337202aee04137fe18a425cafc515df7a8724e5c9bf2c4c2d3f3
jc-wepcrack.tar.gz
Posted Oct 13, 2004
Authored by Johnny Cache | Site hick.org

jc-wepcrack is a distributed WEP cracker. It uses its own sockets-based protocol for communication. It can easily be installed on a lab or your own cluster. It supports any key size. Other features include the ability to save/restore the state of the server to disk and a fancy ncurses interface. It is architecture neutral, and was co-developed on a G4 Powerbook and an x86 Linux machine. If you only have one machine, it will still run.

tags | tool, x86, protocol, wireless
systems | linux
SHA-256 | 9949fc7d342fb9a771aefaff3c401081b8bdb28cef459ac144145a7d1368d2b0
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close