[prev in list] [next in list] [prev in thread] [next in thread] 

List:       security-basics
Subject:    winAUTOPWN v2.7 - Released with a detailed 'HowTo' Document
From:       QUAKER DOOMER <quakerdoomer () inbox ! lv>
Date:       2011-07-20 6:48:33
Message-ID: 1311144513.4e267a41dfde3 () mail ! inbox ! lv
[Download RAW message or body]

Dear all,

 This is to announce release of winAUTOPWN version 2.7
 This version covers almost all remote exploits up-till mid-July 2011 and a few older \
ones as well.

 This version incorporates a few new commandline parameters: -perlrevshURL (for a \
PERL Reverse Shell URL), - mailFROM (smtpsender) and -mailTO (smtpreceiver).
 These are the commandline arguments required for a few exploits which require remote \
connect-back using a perl  shell and email server exploits requiring authentication \
respectively.  This version also tackles various internal bugs and fixes them.

 A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT
 A complete list of User Interface changes is available in UI_CHANGES.txt

 Also, in this version :
 BSDAUTOPWN has been upgraded to version 1.5.
 In this release you will also find pre-compiled binaries for :
 FreeBSD x86
 FreeBSD x64
 DragonFly BSD x86

 A complete Document explaining : How to use winAUTOPWN/bsdAUTOPWN, How to add your \
own exploits  using WELF, other advanced command-line options and everything else
 related to WINDOWS AUTOPWN is available at the Downloads Section.
 It is also available online at: \
http://resources.infosecinstitute.com/vulnerability-testing-winautopwn/

 =======================================================
 winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend \
for quick systems  vulnerability exploitation. It takes inputs like IP address, \
Hostname, CMS Path, etc. and does a smart multi-  threaded portscan for TCP ports 1 \
to 65535. Exploits capable of giving Remote Shells, which are released publicly  over \
the Internet by active contributors and exploit writers are constantly added to \
winAUTOPWN/bsdAUTOPWN.  A lot of these exploits are written in scripting languages \
like python, perl and php. Presence of these language  interpreters is essential for \
successful exploitations using winAUTOPWN/bsdAUTOPWN.  Exploits written in languages \
like C, Delphi, ASM which can be compiled are pre-compiled and added along-with  \
others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and \
waits for the attacker to  use the shell before trying other exploits. This way the \
attacker can count and check the number of exploits which  actually worked on a \
Target System.  A video showing winAUTOPWN in action is available here :
 http://108b7325.ugalleries.net
 =======================================================

 Daily/Weekly Snapshot/Beta Releases of bsdAUTOPWN & winAUTOPWN are always available \
for download from  WINAUTOPWN website.
 The Latest available releases now are winAUTOPWN version 2.7 and bsdAUTOPWN version \
1.5  Coded by : Azim Poonawala (QUAKERDOOMER)
 winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr
 Author's website : http://solidmecca.co.nr
 winAUTOPWN is updated almost daily. Check the Downloads page for weekly snapshots or \
use the  Latest Release can be downloaded from : http://winautopwn.co.nr

 Enjoy the Release.
 "winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-z-z-z-Z-Z)"

 Regards,
 QUAKERDOOMER


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL \
certificate.  We look at how SSL works, how it benefits your company and how your \
customers can tell if a site is secure. You will find out how to test, purchase, \
install and use a thawte Digital Certificate on your Apache web server. Throughout, \
best practices for set-up are highlighted to help you ensure efficient ongoing \
management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic