exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from Laurent Butti

Email address0x9090 at gmail.com
First Active2005-10-18
Last Active2024-08-31
Wireshark CAPWAP Dissector Denial of Service
Posted Aug 31, 2024
Authored by Laurent Butti, j0sm1 | Site metasploit.com

This Metasploit module injects a malformed UDP packet to crash Wireshark and TShark 1.8.0 to 1.8.7, as well as 1.6.0 to 1.6.15. The vulnerability exists in the CAPWAP dissector which fails to handle a packet correctly when an incorrect length is given.

tags | exploit, udp
advisories | CVE-2013-4074
SHA-256 | cec94847adc64618aa31611cb0487ee9eec527cbaa3d2516f2ba91a164efcded
Wireshark CAPWAP Dissector Denial Of Service
Posted May 30, 2014
Authored by Laurent Butti, j0sm1 | Site metasploit.com

This Metasploit module injects a malicious udp packet to crash Wireshark 1.8.0 to 1.8.7 and 1.6.0 to 1.6.15. The vulnerability exists in the capwap dissector which fails to handle an incomplete packet.

tags | exploit, denial of service, udp
advisories | CVE-2013-4074, OSVDB-94091
SHA-256 | f45824d8ae8f2f2ded6c62979f4a3f1eca4605da3e5dba3170672adc46202f24
Wireshark Dissector Denial Of Service
Posted May 24, 2012
Authored by Laurent Butti

Wireshark versions 1.6.0 through 1.6.7 and versions 1.4.0 through 1.4.12 suffer from multiple dissector related denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
systems | linux
SHA-256 | e3de518339a43d0a5f512990af923fedfb53c8e45b810e538dc48e45374c8f12
Atheros Driver Reserved Frame Vulnerability
Posted Nov 17, 2009
Authored by Laurent Butti

The wireless drivers in some Wi-Fi access points (such as the ATHEROS-based Netgear WNDAP330) do not correctly parse malformed reserved management frames.

tags | advisory
advisories | CVE-2009-0052
SHA-256 | f6fc1bda3a0c5dffe082b5ca1d4a671c6e65ff573fec7141a069a46e37ab49da
Marvell Driver Element Overflows
Posted Nov 17, 2009
Authored by Laurent Butti

The wireless drivers in some Wi-Fi access points (such as the MARVELL-based Linksys WAP4400N) do not correctly parse information elements included in association requests.

tags | advisory, overflow
advisories | CVE-2007-5475
SHA-256 | f726b07e5df156d18db6d87b24879cea10a4c642f89c60083faaa78b0fa2ed0f
Madwifi SIOCGIWSCAN Buffer Overflow
Posted Oct 27, 2009
Authored by Laurent Butti, Julien Tinnes

This Metasploit module exploits a stack-based buffer overflow in the Madwifi driver.

tags | exploit, overflow
advisories | CVE-2006-6332
SHA-256 | 0754c28ffae1c6acf4d1bb93d5f0ef0b22f7d54c1e399116520b529c45ac5417
Cisco Unified IP Phone 7960G and 7940G (SIP) RTP Header Vulnerability
Posted Jan 15, 2009
Authored by Laurent Butti, Gabriel Campana

The Cisco Unified IP Phone 7960G and 7940G (SIP) do not correctly parse some malformed RTP headers leading to a deterministic denial of service.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2008-4444
SHA-256 | 00372e28c3e7b41b85a1d67580955f2b158b3cbd709e06747aa677141b355c44
marvell-association.txt
Posted Oct 13, 2008
Authored by Laurent Butti, Julien Tinnes

The wireless drivers in some Wi-Fi access points (such as the MARVELL-based Linksys WAP4400N) do not correctly parse some malformed 802.11 frames, allowing for denial of service and possible code execution.

tags | advisory, denial of service, code execution
advisories | CVE-2008-4441
SHA-256 | 1a181ff342a3f2e4a532d4f63245f3886efc056a407e5ba031eaab9f54c9e7ff
atheros-overflow.txt
Posted Sep 4, 2008
Authored by Laurent Butti, Julien Tinnes

The wireless drivers in some Wi-Fi access points (such as the ATHEROS-based Linksys WRT350N) do not correctly parse the Atheros vendor specific information element included in association requests allowing for denial of service or possible code execution.

tags | advisory, denial of service, overflow, code execution
advisories | CVE-2007-5474
SHA-256 | 65bd74141ad942f7b06d4dba223152dea500c38738174396183436ef7ee12619
marvell-null.txt
Posted Sep 4, 2008
Authored by Laurent Butti, Julien Tinnes

The Netgear WN802T (firmware 1.3.16) with the MARVELL 88W8361P-BEM1 chipset suffers from a NULL SSID association request vulnerability that allows for denial of service and possibly code execution.

tags | advisory, denial of service, code execution
advisories | CVE-2008-1197
SHA-256 | ccb13de54f066e877156a14ba07fa1ac4f865e9ef7de15ecd8de515a0d4f33f9
marvell-overflow.txt
Posted Sep 4, 2008
Authored by Laurent Butti, Julien Tinnes

The Netgear WN802T (firmware 1.3.16) with the MARVELL 88W8361P-BEM1 chipset suffers from an overflow vulnerability when parsing malformed EAPoL-Key packets.

tags | advisory, overflow
advisories | CVE-2008-1144
SHA-256 | 38d2065be0b8a4aeb8224079f08d4c79ba5ac17ce0b4e9162721a30007efe569
cisco-acs.txt
Posted Sep 3, 2008
Authored by Laurent Butti, Gabriel Campana

Cisco Secure ACS does not correctly parse the length of EAP-Response packets which allows remote attackers to cause a denial of service and possibly execute arbitrary code. A remote attacker (acting as a RADIUS client) could send a specially crafted EAP Response packet against a Cisco Secure ACS server in such a way as to cause the CSRadius service to crash (reliable). This bug may be triggered if the length field of an EAP-Response packet has a certain big value, greater than the real packet length.

tags | advisory, remote, denial of service, arbitrary
systems | cisco
advisories | CVE-2008-2441
SHA-256 | 319147cb46911ef704c63fc39bf9d0a5a41748f5c8eed7579cf3a521ef71ba93
madwifi.txt
Posted Dec 8, 2006
Authored by Laurent Butti, Jerome RAZNIEWSKI, Julien Tinnes

There is a buffer overflow in the Madwifi Atheros driver in some functions called by SIOCSIWSCAN ioctl.

tags | advisory, overflow
advisories | CVE-2006-6332
SHA-256 | ae78388667ab3deb4319d8f83bc674032a7c7b8df47d26ab5490c18a34bceb0c
wifi-advanced-stealth-patches.tar.gz
Posted Oct 4, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

wifi-advanced-stealth-patches are a set of basic patches for the madwifi-ng driver in order to achieve good stealth at low cost! It can be useful in protecting your own network from wardrivers and attacks (denial-of-service, wep cracking...) as your modified access point and client are the only ones that understand themselves! Some embedded access point like the Netgear WG634U have an Atheros chipset (OpenWRT + madwifi) and thus may be modified to support stealth at low cost. These patches are only a proof-of-concept and may be improved in many ways as possibilities are quite infinite... These patches were released at BlackHat US 2006.

tags | tool, wireless
SHA-256 | eb1c82d15aa2a2817a8f3510a77fa9d8aef7363d7ebb0cc1b2a5206f49b973fd
pyrawcovert-0.1.tar.gz
Posted Oct 4, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

pyrawcovert is an enhancement of the Raw Covert tool that was released at ShmooCon2006. It is a covert channel over the 802.11 protocol. It uses valid control frames (ACK) for carrying the communication protocol. These frames are usually considered as non malicious and thus are not analyzed by most wireless IDS. This tool enables a full-duplex communication between two pyrawcovert and thus make it possible to perform some interactive communications (ssh...) or file transfers (scp...) thru this covert channel. This version was released at BlackHat US 2006.

tags | tool, protocol, wireless
SHA-256 | 5a623757ddedb3d7b32645a8c8d4e3cf4628b3ccffb931316cc7e12bfe244b6f
rcovert-0.1.tar.gz
Posted Feb 9, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Covert is a program that initiates a covert channel over IEEE 802.11 networks thanks to wireless raw injection. It aims at encoding a covert channel in valid ACK frames in the RA address field. This program is a basic proof-of-concept code.

Changes: Public release.
tags | tool, wireless
SHA-256 | c5841ce4e81f8eb059f35f0253eb832ea09516d507b38ba7301dd6b8f12bd765
rglueap-0.1.tar.gz
Posted Feb 9, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Glue AP is a program that catches wireless stations searching for preferred SSIDs. This tool catches probe requests, send back appropriate probe responses and then tries to catch authentication and association requests. This is a kind of Glue AP which purpose is to catch clients that are actively scanning for any SSID. All this stuff is done in monitor mode and uses raw injection which seems to be required if this method may be implemented in a Wireless IDS (that usually perform detection in monitor mode). This program is a basic proof-of-concept code.

Changes: Public release.
tags | tool, wireless
SHA-256 | 13cce714959056d41627ec9442342d46072f9d72ef57554b9d03ebfb353ed2d1
rfakeap-0.2.tar.gz
Posted Feb 9, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Fake AP is a program that emulates IEEE 802.11 access points thanks to wireless raw injection. It aims at creating/injecting both beacon and probe response frames in order to emulate valid IEEE 802.11 access points. This program is a basic proof-of-concept code.

Changes: Aded a probe response mode.
tags | tool, wireless
SHA-256 | 4e5f63d8488b0fbd1a709429feb797c8c679de48f47ef93ab4741f8506830667
rfakeap-0.1.tar.gz
Posted Oct 18, 2005
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Fake AP is a program that emulates IEEE 802.11 access points thanks to wireless raw injection. It aims at creating/injecting both beacon and probe response frames in order to emulate valid IEEE 802.11 access points. This program is a basic proof-of-concept code.

tags | tool, wireless
SHA-256 | 9e4755e10859803427684f739877b9269934518fdc21233cc9616a6e38bfee03
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close