exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Brad Antoniewicz

Email addressbrad.antoniewicz at foundstone.com
First Active2008-02-23
Last Active2011-01-20
ProxBrute - Taking Proxcard Cloning To The Next Level
Posted Jan 20, 2011
Authored by Brad Antoniewicz

This paper describes the basic process of using the proxmark3 to clone Proxcards and then introduces ProxBrute, a new tool for brute forcing valid proxcard values.

tags | paper
SHA-256 | 2d0fd9f79fb7dbb051b1d0d095dea1dd28993622fb07d852518c7f7100181d3b
ProxBrute 0.3
Posted Jan 12, 2011
Authored by Brad Antoniewicz

ProxBrute is a custom firmware written for the proxmark3. It extends the currently available firmware (revision 465) to support brute force attacks against proximity card access control systems. This version of ProxBrute requires the knowledge of a [once] valid tag value to vertically or horizontally escalate the tag's privileges.

tags | cracker
systems | unix
SHA-256 | a155a9dd000312c20ecbe6ca6bab1bc991183e9dea73578a76754b148ab1332a
ntop 3.3.10 Denial Of Service
Posted Aug 18, 2009
Authored by Brad Antoniewicz

ntop versions 3.3.10 and below suffer from a basic authentication null pointer denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2009-2732
SHA-256 | aad3f03488f5dcebf8a3f95a8a2dd8fd1ea219bc8c5bf2382388fed6da94eb39
Defeating The iPhone Passcode
Posted Mar 3, 2009
Authored by Brad Antoniewicz

Whitepaper called Defeating the iPhone Passcode.

tags | telephony
systems | apple, iphone
SHA-256 | 4057ba42acd5baab592ee9f0a9a299e6dee396369e8d1034ae8a86a9271d0b89
firmchannel-xss.txt
Posted Nov 5, 2008
Authored by Brad Antoniewicz

FirmChannel Digital Signage version 3.24 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2008-4931
SHA-256 | bcb35fe0a2c40a10309b3795346c219cd63abc3846b20cc4b2ddf929a5a51479
hammer-traversal.txt
Posted Oct 6, 2008
Authored by Brad Antoniewicz

Hammer Software MetaGauge version 1.0.0.17 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2008-4421
SHA-256 | b7c38dcf52a5a106beaa86d8e29567cd70e6d8a1d3f7b880295137d31cfcfc8e
ciscobbsm-xss.txt
Posted May 13, 2008
Authored by Brad Antoniewicz

Cisco BBSM Captive Portal suffers from a cross site scripting vulnerability.

tags | exploit, xss
systems | cisco
advisories | CVE-2008-2165
SHA-256 | 3678e1a7be3cdc235260ae444cf866aabaab44bd2264b0c8d01b9db67da91971
swiki-xss.txt
Posted Apr 9, 2008
Authored by Brad Antoniewicz

Swiki version 1.5 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9ab010fffeaf6a43e91740ca213df427dbb5e10d74dc70052a56e02070d5a49c
beehive-hardcode.txt
Posted Mar 3, 2008
Authored by Brad Antoniewicz

The Beehive/SendFile.NET Secure File Transfer appliance appears to have credentials hardcoded within the outboxWriteUnsent() function of the FTPThread.class file of SendFile.jar.

tags | advisory
SHA-256 | c8a5ae71651f04dc4e1c0bb97062c1dfd25c5c55219dfbc64c34da8a90a332be
802.11Attacks.pdf
Posted Feb 23, 2008
Authored by Brad Antoniewicz

This paper provides a step by step walk-through of popular wireless attacks. It also describes how to perform the new AP Impersonation attack using FreeRADIUS-WPE, the new EAP-MD5 Brute force attack, and a variety of other not-so documented attacks.

tags | paper
SHA-256 | 42a7ff7f286496f8417cfa70abc4a67d3d2149f5bb50e623e09c0ea73a33a0cb
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close