what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Gerard Fuguet

Email addressgerard at fuguet.cat
First Active2017-05-03
Last Active2021-11-08
My Neighbor's Flat Smells Like Data
Posted Nov 8, 2021
Authored by Gerard Fuguet

Whitepaper on hacking smart switches to capture credentials for a network.

tags | paper
SHA-256 | f8f67bb8bd3d07c337c5634f1d46b38d4f4c0584c9fdd46ad313d8f83fd77937
Skippipe: Skipping The Watermark In Digital Content
Posted Mar 6, 2020
Authored by Gerard Fuguet

Whitepaper called Skippipe: Skipping the watermark in digital content.

tags | paper
SHA-256 | cb5c29aa69a59a6fcfed058f0097df5a5ce31836d2ed8c91969ddacb5f2ad521
Don't Break The Door, The Key Is Under The Doormat
Posted Dec 19, 2019
Authored by Gerard Fuguet

Whitepaper called Don't Break The Door, The Key Is Under The Doormat.

tags | paper
SHA-256 | e7e4105f7c52ed138e43edf0a901c3125fc58e88375089f39ed0a16c487ff549
Call Your Key To Phone All
Posted Sep 17, 2019
Authored by Gerard Fuguet

This whitepaper discusses acquiring VoIP parameters to take advantage of it and will demonstrate how to extract the password parameter from the provisioning mechanism used by Adamo Telecom Iberia S.A.U.

tags | paper
SHA-256 | 5e9e150fa23861dfaf419e244d39cf6892721ab6ea566dfdf2cfe52eacf2018c
Inteno IOPSYS Gateway 3DES Key Extraction Improper Access
Posted Sep 16, 2019
Authored by Gerard Fuguet

Inteno EG200 routers with firmware versions EG200-WU7P1U_ADAMO3.16.4-190226_1650 and below have a JUCI ACL misconfiguration that allows the "user" account to extract the 3DES key via JSON commands to ubus. The 3DES key is used to decrypt the provisioning file provided by Adamo Telecom on a public URL via cleartext HTTP.

tags | exploit, web
advisories | CVE-2019-13140
SHA-256 | 39f36f4b6db5a31b0de8f71b6618765de1c62790a395b11e89b90ba6c5ca5670
BluedIoT: When A Mature And Immature Technology Mixes, Becomes An Idiot Situation
Posted May 3, 2017
Authored by Gerard Fuguet

Whitepaper called BluedIoT: When a mature and immature technology mixes, becomes an "idiot" situation.

tags | paper
SHA-256 | 4eab7ec628ce14a044cbf3026b1eca54090b4b6e66a555432e12bdd87dfeb531
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close