Penetration Testing mailing list archives

Re: Inguma v0.0.4 release


From: "crazy frog crazy frog" <i.m.crazy.frog () gmail com>
Date: Fri, 5 Oct 2007 20:29:53 +0530

Hi Joxean,

Nice tool.Is there any possiblity to add the automated exploitation
stuff like core impact or canvas?i think you can use metasploit for
that?
thoughts?


On 10/4/07, Joxean Koret <joxeankoret () yahoo es> wrote:
Hi to all,

Inguma (A Free Penetration Testing Tookit) Version 0.0.4 has been
released and is available for download in
http://sourceforge.net/projects/inguma.

ChangeLog:

* Many bug fixes.
* Added one module to check for the most common Oracle Appplications
Server vulnerable urls.
* Added "smbgold" module, to search in SMB/CIFS shares for interesting
files (*.mdb, passwords.txt, ...).
* Added "scapereal" to distribution. Run "sniffer", sniff a packet list
and type "ethereal". You will see an ethereal like GTK Window showing
all the sniffed packets in a graphical fashion.
* First version of the GUI using pyqt.
* Added a module to gather information from an Oracle TimesTen server.

Screenshoots of the new QT Gui:
http://sourceforge.net/project/screenshots.php?group_id=188246&ssid=68879

Download:
http://downloads.sourceforge.net/inguma/inguma-0.0.4.tar.gz?modtime=1191443222&big_mirror=0

Complete ChangeLog:
http://sourceforge.net/project/shownotes.php?release_id=544047&group_id=188246

Thanks!
Joxean Koret






-- 
---------------------------------------
there is a contest on secgeeks:
http://secgeeks.com/announcing_secgeeks_contest.html
register here:-
http://secgeeks.com/user/register
rss feeds :-
http://secgeeks.com/node/feed

http://www.newskicks.com
Submit and kick for new stories from all around the world.
---------------------------------------

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: