Inguma 0.0.7.2 released
Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
Features for this release
- Fixed bugs in allmost all modules.
- Added support for command line history and autocompletion (whenever readline is available).
- Fixed various oracle module’s documentation.
- Added the first version of "anticrypt", a tool to detect the encryption algorithm used for a password hash. It saves a lot of time when auditing a (weak) encryption algorithm.
- Added a Nikto plugin (Thanks you Sullo!).
- Added module "archanix". Usefull to check old Unix boxes.
- Many changes to PyShellcodelib (Thanks erg0t!).
- Added a brute forcer for SMTP servers.
- First release of the documentation by Andrew Brooks. Check the wiki available at http://inguma.wiki.sourceforge.net/ (Many thanks Andrew!).
- Added 4 new Oracle exploit modules for CPUJAN2008.
- Added a skr1pT k1|>i3 like module for the Oracle PL/SQL gateway flaw. Give a target & port and use "oragateway". The module will automagically guess the correct DAD and bypass technique. After it an SQL terminal will be opened.
Post scriptum
Compliance Mandates
|