[prev in list] [next in list] [prev in thread] [next in thread]
List: security-basics
Subject: winAUTOPWN v2.7 - Released with a detailed 'HowTo' Document
From: QUAKER DOOMER <quakerdoomer () inbox ! lv>
Date: 2011-07-20 6:48:33
Message-ID: 1311144513.4e267a41dfde3 () mail ! inbox ! lv
[Download RAW message or body]
Dear all,
This is to announce release of winAUTOPWN version 2.7
This version covers almost all remote exploits up-till mid-July 2011 and a few older \
ones as well.
This version incorporates a few new commandline parameters: -perlrevshURL (for a \
PERL Reverse Shell URL), - mailFROM (smtpsender) and -mailTO (smtpreceiver).
These are the commandline arguments required for a few exploits which require remote \
connect-back using a perl shell and email server exploits requiring authentication \
respectively. This version also tackles various internal bugs and fixes them.
A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT
A complete list of User Interface changes is available in UI_CHANGES.txt
Also, in this version :
BSDAUTOPWN has been upgraded to version 1.5.
In this release you will also find pre-compiled binaries for :
FreeBSD x86
FreeBSD x64
DragonFly BSD x86
A complete Document explaining : How to use winAUTOPWN/bsdAUTOPWN, How to add your \
own exploits using WELF, other advanced command-line options and everything else
related to WINDOWS AUTOPWN is available at the Downloads Section.
It is also available online at: \
http://resources.infosecinstitute.com/vulnerability-testing-winautopwn/
=======================================================
winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend \
for quick systems vulnerability exploitation. It takes inputs like IP address, \
Hostname, CMS Path, etc. and does a smart multi- threaded portscan for TCP ports 1 \
to 65535. Exploits capable of giving Remote Shells, which are released publicly over \
the Internet by active contributors and exploit writers are constantly added to \
winAUTOPWN/bsdAUTOPWN. A lot of these exploits are written in scripting languages \
like python, perl and php. Presence of these language interpreters is essential for \
successful exploitations using winAUTOPWN/bsdAUTOPWN. Exploits written in languages \
like C, Delphi, ASM which can be compiled are pre-compiled and added along-with \
others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and \
waits for the attacker to use the shell before trying other exploits. This way the \
attacker can count and check the number of exploits which actually worked on a \
Target System. A video showing winAUTOPWN in action is available here :
http://108b7325.ugalleries.net
=======================================================
Daily/Weekly Snapshot/Beta Releases of bsdAUTOPWN & winAUTOPWN are always available \
for download from WINAUTOPWN website.
The Latest available releases now are winAUTOPWN version 2.7 and bsdAUTOPWN version \
1.5 Coded by : Azim Poonawala (QUAKERDOOMER)
winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr
Author's website : http://solidmecca.co.nr
winAUTOPWN is updated almost daily. Check the Downloads page for weekly snapshots or \
use the Latest Release can be downloaded from : http://winautopwn.co.nr
Enjoy the Release.
"winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-z-z-z-Z-Z)"
Regards,
QUAKERDOOMER
------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL \
certificate. We look at how SSL works, how it benefits your company and how your \
customers can tell if a site is secure. You will find out how to test, purchase, \
install and use a thawte Digital Certificate on your Apache web server. Throughout, \
best practices for set-up are highlighted to help you ensure efficient ongoing \
management of your encryption keys and digital certificates.
http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic