Penetration Testing mailing list archives

Inguma 0.0.6 Released


From: Joxean Koret <joxeankoret () yahoo es>
Date: Mon, 26 Nov 2007 19:13:50 +0100

Hi to all,

Inguma version 0.0.6 have been released. In this new version I added
many modules as well as enhanced existent ones as, in example, the
Oracle modules. The Oracle payloads now uses the Cursor Injection method
when possible so CREATE PROCEDURE system privilege is not needed to
become DBA.

The support for InlineEgg, added in version 0.0.5.1, have been removed
and a new completely free library have been added: PyShellCodeLib.
Currently, the library supports Linux and OpenBSD x86 based shellcodes.
*INITIAL* version.

The static analysis framework OpenDis have been enhanced and now you can
use the API exposed by OpenDis to write your own binary static analysis
tools. As an example of the API, a tool to make binary diffs have been
added. Take a look to the file $INGUMA_DIR/dis/asmdiff.py and to the
README stored in the same directory.

New 5 exploits for Oracle Databases have been added and the module
"sidguess" have been enhanced to retrieve the SID of the database
instance from the Enterprise Manager/Database Control banner when
possible.

The new modules added to the discover, gather and brute sections are the
following:

    brutehttp: A brute forcer for HTTP servers.
    extip    : A tool to known your external IP address. Very usefull to
check anonymous proxies, i.e.
    nmbstat  : A tool to gather NetBIOS information.
    ipscan   : A tool to make IP protocol scans. The tool check what IP
protocols are enabled in the target.
    arppoison: A tool to poison target's ARP cache

Download
http://sourceforge.net/project/platformdownload.php?group_id=188246

Web Page
http://inguma.sourceforge.net

Project web page
http://sourceforge.net/projects/inguma

Complete ChangeLog
http://sourceforge.net/project/shownotes.php?release_id=557099&group_id=188246

Regards,
Joxean Koret

Attachment: signature.asc
Description: This is a digitally signed message part


Current thread: