Inguma 0.0.7.2 released

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Features for this release

  • Fixed bugs in allmost all modules.
  • Added support for command line history and autocompletion (whenever readline is available).
  • Fixed various oracle module’s documentation.
  • Added the first version of "anticrypt", a tool to detect the encryption algorithm used for a password hash. It saves a lot of time when auditing a (weak) encryption algorithm.
  • Added a Nikto plugin (Thanks you Sullo!).
  • Added module "archanix". Usefull to check old Unix boxes.
  • Many changes to PyShellcodelib (Thanks erg0t!).
  • Added a brute forcer for SMTP servers.
  • First release of the documentation by Andrew Brooks. Check the wiki available at http://inguma.wiki.sourceforge.net/ (Many thanks Andrew!).
  • Added 4 new Oracle exploit modules for CPUJAN2008.
  • Added a skr1pT k1|>i3 like module for the Oracle PL/SQL gateway flaw. Give a target & port and use "oragateway". The module will automagically guess the correct DAD and bypass technique. After it an SQL terminal will be opened.

Post scriptum

Compliance Mandates

  • Application Scanner :

    PCI/DSS 6.3, SOX A12.4, GLBA 16 CFR 314.4(b) and (2), HIPAA 164.308(a)(1)(i), FISMA RA-5, SA-11, SI-2, ISO 27001/27002 12.6, 15.2.2

  • Penetration testing & Ethical Hacking :

    PCI DSS 11.3, SOX A13.3, GLBA 16 CFR Part 314.4 (c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001/27002 12.6, 15.2.2

  • Vulnerability Scanner :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2


Related Articles

Application Scanner
Inguma
Penetration testing & Ethical Hacking
Vulnerability Scanner