websecurity@lists.webappsec.org

The Web Security Mailing List

View all threads

winAUTOPWN v2.6 Released

QD
QUAKER DOOMER
Sat, Mar 5, 2011 10:39 AM

Dear all,

This is to announce release of winAUTOPWN version 2.6
This version covers almost all remote exploits up-till February 2011 and a few older ones as well.

This version incorporates a new commandline parameter: MAXTHREADS
for bsdAUTOPWN and winAUTOPWN. This will help to force the number of threads for portscan which get set
automatically according to the IP address.
This is helpful in LAN setups where public IP addresses are used as local.
This same parameter: MAXTHREADS is available in the Frontend Win32 GUI for winAUTOPWN.

A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT
A complete list of User Interface changes is available in UI_CHANGES.txt

Also, in this version :
BSDAUTOPWN has been upgraded to version 1.4.

In this release you will also find a pre-compiled binaries for :
FreeBSD x86
FreeBSD x64
DragonFly BSD x86

To run bsdAUTOPWN you will require a FreeBSD OS. Perform the below to set the binary with executable flags.
chmod +x bsdAUTOPWN
./bsdAUTOPWN

For x64 release, perform the below.
chmod +x bsdAUTOPWN.x64
./bsdAUTOPWN.x64

For DFLY SVR4 release, perform the below.
chmod +x bsdAUTOPWN.dfly.SVR4
./bsdAUTOPWN.dfly.SVR4

Note that BSDAUTOPWN uses the same "exploits/" directory as that of winAUTOPWN.

BSD AUTOPWN is updated with all new features which are being added to winAUTOPWN.
It has been more than two years since winAUTOPWN had been made public. Although the very first version of
winAUTOPWN was written and circulated internally on 20th Jan 2009, it was publicly made available (version 1.6)
only on 31st March 2009.

---======================
winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems
vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi-
threaded portscan for TCP ports 1 to 65535. Exploits capable of giving Remote Shells, which are released publicly
over the Internet by active contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN.
A lot of these exploits are written in scripting languages like python, perl and php. Presence of these language
interpreters is essential for successful exploitations using winAUTOPWN/bsdAUTOPWN.
Exploits written in languages like C, Delphi, ASM which can be compiled are pre-compiled and added along-with
others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and waits for the attacker to
use the shell before trying other exploits. This way the attacker can count and check the number of exploits which
actually worked on a Target System.

A video showing winAUTOPWN in action is available here :
http://108b7325.ugalleries.net

---======================

Daily/Weekly Snapshot/Beta Releases of bsdAUTOPWN & winAUTOPWN are always available for download from
WINAUTOPWN website.

The Latest available releases now are winAUTOPWN version 2.6 and bsdAUTOPWN version 1.4

Coded by : Azim Poonawala (QUAKERDOOMER)

winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr

Author's website : http://solidmecca.co.nr

winAUTOPWN is updated almost daily. Check the Download page for weekly snapshots or use the

Latest Release can be downloaded from : http://winautopwn.co.nr

Enjoy the Release.

"winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-z-z-z-Z-Z)"

Regards,
QUAKERDOOMER

Dear all, This is to announce release of winAUTOPWN version 2.6 This version covers almost all remote exploits up-till February 2011 and a few older ones as well. This version incorporates a new commandline parameter: MAXTHREADS for bsdAUTOPWN and winAUTOPWN. This will help to force the number of threads for portscan which get set automatically according to the IP address. This is helpful in LAN setups where public IP addresses are used as local. This same parameter: MAXTHREADS is available in the Frontend Win32 GUI for winAUTOPWN. A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT A complete list of User Interface changes is available in UI_CHANGES.txt Also, in this version : BSDAUTOPWN has been upgraded to version 1.4. In this release you will also find a pre-compiled binaries for : FreeBSD x86 FreeBSD x64 DragonFly BSD x86 To run bsdAUTOPWN you will require a FreeBSD OS. Perform the below to set the binary with executable flags. chmod +x bsdAUTOPWN ./bsdAUTOPWN For x64 release, perform the below. chmod +x bsdAUTOPWN.x64 ./bsdAUTOPWN.x64 For DFLY SVR4 release, perform the below. chmod +x bsdAUTOPWN.dfly.SVR4 ./bsdAUTOPWN.dfly.SVR4 Note that BSDAUTOPWN uses the same "exploits/" directory as that of winAUTOPWN. BSD AUTOPWN is updated with all new features which are being added to winAUTOPWN. It has been more than two years since winAUTOPWN had been made public. Although the very first version of winAUTOPWN was written and circulated internally on 20th Jan 2009, it was publicly made available (version 1.6) only on 31st March 2009. ======================================================= winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi- threaded portscan for TCP ports 1 to 65535. Exploits capable of giving Remote Shells, which are released publicly over the Internet by active contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN. A lot of these exploits are written in scripting languages like python, perl and php. Presence of these language interpreters is essential for successful exploitations using winAUTOPWN/bsdAUTOPWN. Exploits written in languages like C, Delphi, ASM which can be compiled are pre-compiled and added along-with others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and waits for the attacker to use the shell before trying other exploits. This way the attacker can count and check the number of exploits which actually worked on a Target System. A video showing winAUTOPWN in action is available here : http://108b7325.ugalleries.net ======================================================= Daily/Weekly Snapshot/Beta Releases of bsdAUTOPWN & winAUTOPWN are always available for download from WINAUTOPWN website. The Latest available releases now are winAUTOPWN version 2.6 and bsdAUTOPWN version 1.4 Coded by : Azim Poonawala (QUAKERDOOMER) winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr Author's website : http://solidmecca.co.nr winAUTOPWN is updated almost daily. Check the Download page for weekly snapshots or use the Latest Release can be downloaded from : http://winautopwn.co.nr Enjoy the Release. "winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-z-z-z-Z-Z)" Regards, QUAKERDOOMER