Security Basics mailing list archives

winAUTOPWN v2.7 - Released with a detailed 'HowTo' Document


From: QUAKER DOOMER <quakerdoomer () inbox lv>
Date: Wed, 20 Jul 2011 09:48:33 +0300

Dear all,

 This is to announce release of winAUTOPWN version 2.7
 This version covers almost all remote exploits up-till mid-July 2011 and a few older ones as well.

 This version incorporates a few new commandline parameters: -perlrevshURL (for a PERL Reverse Shell URL), -
mailFROM (smtpsender) and -mailTO (smtpreceiver).
 These are the commandline arguments required for a few exploits which require remote connect-back using a perl 
shell and email server exploits requiring authentication respectively.
 This version also tackles various internal bugs and fixes them.

 A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT
 A complete list of User Interface changes is available in UI_CHANGES.txt

 Also, in this version :
 BSDAUTOPWN has been upgraded to version 1.5.
 In this release you will also find pre-compiled binaries for :
 FreeBSD x86
 FreeBSD x64
 DragonFly BSD x86

 A complete Document explaining : How to use winAUTOPWN/bsdAUTOPWN, How to add your own exploits 
using WELF, other advanced command-line options and everything else
 related to WINDOWS AUTOPWN is available at the Downloads Section.
 It is also available online at: http://resources.infosecinstitute.com/vulnerability-testing-winautopwn/

 =======================================================
 winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems
 vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi-
 threaded portscan for TCP ports 1 to 65535. Exploits capable of giving Remote Shells, which are released publicly
 over the Internet by active contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN.
 A lot of these exploits are written in scripting languages like python, perl and php. Presence of these language
 interpreters is essential for successful exploitations using winAUTOPWN/bsdAUTOPWN.
 Exploits written in languages like C, Delphi, ASM which can be compiled are pre-compiled and added along-with
 others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and waits for the attacker to
 use the shell before trying other exploits. This way the attacker can count and check the number of exploits which
 actually worked on a Target System.
 A video showing winAUTOPWN in action is available here :
 http://108b7325.ugalleries.net
 =======================================================

 Daily/Weekly Snapshot/Beta Releases of bsdAUTOPWN & winAUTOPWN are always available for download from
 WINAUTOPWN website.
 The Latest available releases now are winAUTOPWN version 2.7 and bsdAUTOPWN version 1.5
 Coded by : Azim Poonawala (QUAKERDOOMER)
 winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr
 Author's website : http://solidmecca.co.nr
 winAUTOPWN is updated almost daily. Check the Downloads page for weekly snapshots or use the
 Latest Release can be downloaded from : http://winautopwn.co.nr

 Enjoy the Release.
 "winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-z-z-z-Z-Z)"

 Regards,
 QUAKERDOOMER


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: