exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Augusto Pereyra

Email addressprivate
First Active2009-03-25
Last Active2015-12-18
View User Profile
Samsung SoftAP Weak Password
Posted Dec 18, 2015
Authored by Augusto Pereyra

Samsung's SoftAP WPA2-PSK password generation is weak and can be cracked in a few hours.

tags | advisory
advisories | CVE-2015-5729
SHA-256 | d07302b705ff9d90ee5c3f1bd5da6e5f61c13558040cb8ca8a031f9fbc137494
Using QR Tags To Attack Smart Phones
Posted Sep 13, 2011
Authored by Augusto Pereyra

Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.

tags | paper, arbitrary
SHA-256 | 5aeb974041271775d2797f33f606f42ebe41ac2480ecbba6cd286c2ec7fba100
LFI Map 1.3
Posted Dec 1, 2010
Authored by Augusto Pereyra | Site code.google.com

LFImap is a python script that tests leverages local file inclusion vulnerabilities to figure out the root of a file system, looks inside of some files and more.

tags | tool, local, root, scanner, vulnerability, python, file inclusion
systems | unix
SHA-256 | 541dc1657012d42d82d1363b528f66bb2d6a2ccf0c083443b1475b4be48908c5
IPS Building Script
Posted Aug 11, 2009
Authored by Augusto Pereyra | Site code.google.com

This script provides an all-in-one easy installation of Snort in a box in bridge mode with a complex configuration.

tags | tool, sniffer
SHA-256 | 527e35e81c79071a3170ba4bc5d9b499b0471717e931e65c8d776e9950ba2744
Pivot Scan Written In Ruby
Posted Mar 25, 2009
Authored by Augusto Pereyra | Site code.google.com

Pivot Scan is a scanner written in Ruby for the meterpreter tool.

tags | tool, scanner, ruby
systems | unix
SHA-256 | 45ecdf791525de7234a5d539bbcfc9801fc8ecc45b4c462216830f1b0c819b69
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close