WebApp Sec mailing list archives

winAUTOPWN v2.4 Released


From: QUAKER DOOMER <quakerdoomer () inbox lv>
Date: Sat, 30 Oct 2010 11:00:37 +0300

Dear all, 

This is to announce release of winAUTOPWN version 2.4
This version covers almost all remote exploits up-till October 2010.
Web Application Exploits like Remote File Inclusion Vulnerabilities and Remote Code Execution Vulnerabilities 
have been now set to off by default. To enable winAUTOPWN to test these use the switches -doRFI and -doRCE 
respectively from command-line.

A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT 
A complete list of User Interface changes is available in UI_CHANGES.txt

Also, in this version : 
BSDAUTOPWN has been upgraded to version 1.2.

In this release you will find a pre-compiled binaries for :
FreeBSD x86
FreeBSD x64
DragonFly BSD x86

In this release a binary named bsdAUTOPWN.dfly.SVR4 compiled on DragonFly BSD 2.2.1 (SVR4) have been 
added.
Required exploit codes for this binary have also been compiled on DragonFly BSD 2.2.1 SVR4 FreeBSD platform.
The x64 compiled binary for bsdAUTOPWN also has been updated (bsdAUTOPWN.x64) to include the exploits till 
date. 

To run bsdAUTOPWN you will require a FreeBSD OS. Perform the below the set the binary with executable flags. 
chmod +x bsdAUTOPWN 
./bsdAUTOPWN 

For x64 release, perform the below.
chmod +x bsdAUTOPWN.x64 
./bsdAUTOPWN.x64 

For DFLY SVR4 release, perform the below.
chmod +x bsdAUTOPWN.dfly.SVR4 
./bsdAUTOPWN.dfly.SVR4 

Note that BSDAUTOPWN uses the same "exploits/" directory as that of winAUTOPWN. 

=======================================================
winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems 
vulnerability exploitation.
It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi-threaded portscan for TCP ports 
1 to 65535. Exploits capable of giving Remote Shells, which are released publicly over the Internet by active 
contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN.
A lot of these exploits are written in scripting languages like python, perl and php. Presence of these language 
interpreters is essential for successful exploitations using winAUTOPWN/bsdAUTOPWN.
Exploits written in languages like C, Pascal, ASM which can be compiled are pre-compiled and added along-with 
others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and waits for the attacker to 
use the shell before trying other exploits. This way the attacker can count and check the number of exploits which 
actually worked on a Target System.

A video showing winAUTOPWN 2.4 in action is available here :
http://108b7325.ugalleries.net

=======================================================

Daily/Weekly Snapshot/Beta Releases of bsdAUTOPWN & winAUTOPWN are always available for download from 
WINAUTOPWN website. 

The Latest available releases now are winAUTOPWN version 2.4 and bsdAUTOPWN version 1.2 

Coded by : Azim Poonawala (QUAKERDOOMER) 

winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr 

Author's website : http://solidmecca.co.nr 

winAUTOPWN is updated almost daily. Check the Download page for weekly snapshots or use the 

Latest Release can be downloaded from : http://winautopwn.co.nr 

Enjoy the Release. 

"winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-z-z-z-Z-Z)" 

Regards, 
QUAKERDOOMER




This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------


Current thread: