[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1189097482.13517.5.camel@localhost>
Date: Thu, 06 Sep 2007 18:51:21 +0200
From: Joxean Koret <joxeankoret@...oo.es>
To: pen-test@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Inguma 0.0.3 - A Free Penetration Testing and
Vulnerability Research Toolkit
Hi to all,
The new version of Inguma, Inguma 0.0.3-ALPHA, have been released and a
lot of work have been done. In that version you will found a
disassembler (with special support for x86 and AVR) that makes easier
the life of a security researcher when doing an static analysis of a
commercial closed source product. Only command line version (no GUI,
itsn't IDA Pro, but is cheaper ;]), redirect the output to a file a look
to the generated pseudo-assembler. It will be more readable than
"standard raw" disassembled asm code.
Also, in the krash directory, you will found a general purpose automatic
"token based" fuzzer among with various sample packets.
New in the toolkit are many new simple libraries that will make easier
the task of writting new exploits and fuzzers for various protocols.
Needs to say that the Oracle PL/SQL fuzzer have been updated. Take a
look ;)
A bunch of brute forcers, such as one for SMB/CIFS compatibles servers
(such as Samba), have been added to the toolkit.
Read the README, [INGUMA_DIR]/dis/README and [INGUMA_DIR]/krash/README
files for more information.
Download it from the Sourceforge.Net project page available at:
http://sourceforge.net/projects/inguma.
Thanks & Regards,
Joxean Koret
Download attachment "signature.asc" of type "application/pgp-signature" (192 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists