Inguma version 0.0.6 have been released. In this new version I added many modules as well as enhanced existent ones as, in example, the Oracle modules. The Oracle payloads now uses the Cursor Injection method when possible so CREATE PROCEDURE system privilege is not needed to become DBA.
The support for InlineEgg, added in version 0.0.5.1, have been removed and a new completely free library have been added: PyShellCodeLib. Currently, the library supports Linux and OpenBSD x86 based shellcodes.
The static analysis framework OpenDis have been enhanced and now you can use the API exposed by OpenDis to write your own binary static analysis tools. As an example of the API, a tool to make binary diffs have been added. Take a look to the file $INGUMA_DIR/dis/asmdiff.py and to the README stored in the same directory.
New 5 exploits for Oracle Databases have been added and the module "sidguess" have been enhanced to retrieve the SID of the database instance from the Enterprise Manager/Database Control banner when possible.
The new modules added to the discover, gather and brute sections are the following:
brutehttp: A brute forcer for HTTP servers.
extip : A tool to known your external IP address. Very usefull to check anonymous proxies, i.e.
nmbstat : A tool to gather NetBIOS information.
ipscan : A tool to make IP protocol scans. The tool check what IP protocols are enabled in the target.
arppoison: A tool to poison target's ARP cache
Log in to post a comment.