winAUTOPWN2.8更新下载

winAUTOPWN和bsdAUTOPWN是一款用于快速漏洞利用的交互式框架,能够自动扫描指定IP地址、主机名和CMS路径的目标,通过多线程对1-6553端口进行扫描。如发现可利用漏洞,系统将提供远程shell获取能力,并支持多种操作系统选择、Ruby脚本漏洞解析、远程命令执行、逆向cmd shellcode及不同平台的shellcode。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

    winAUTOPWN和bsdAUTOPWN 是一个最小的交互式框架,它是快速漏洞利用系统的前端。你只需要输入目标IP地址,主机名,cms路径等,系统会自动对目标的1-6553端口进行多线程扫描,如果目标存在可利用的漏洞,winAUTOPWN会为你获得一个远程的shell。

 

下载地址:http://download.youkuaiyun.com/detail/heimian/3860040

Latest UI changes : (as of Sept 26 2011)

--------------------------------------------------------------------------------

Added one more commandline parameter -targetOS for list of operating Systems which winAUTOPWN asks to select for the target.
Added a few ruby exploits which require 'socket' alone for interpretation. Hence, winAUTOPWN now requires ruby installed as well, just like perl, python and php.
Added support for Reverse cmd Shellcode, shellcodes for Linux, FreeBSD and Solaris as well.
Added an external module called mod_shellcode which aids in selecting and changing the type of shellcode for any scripted (uncompiled) exploit.


Latest Unpolished Sita Additions : (as of Nov 03 2011)

--------------------------------------------------------------------------------

Digital College v1.1 Remote File Inclusion Vulnerability Exploits
eFront <= 3.6.10 (build 11944) 'templateName' - templateContent - RCE Exploit
phpScheduleIt <= 1.2.10 Remote Code Execution Exploit by EgiX Exploit
phpLDAPadmin <= 1.2.1.1 Remote PHP Code Injection Exploit by EgiX
Jaws 0.8.14 Remote File Inclusion Vulnerability Exploits
2Moons v1.4 RFI Vulnerability Exploits
Freefloat FTP Server ALLO Buffer Overflow Vulnerability Exploit
JBOSS AS Remote Exploits v2
vBulletin® Version 4.1.7 Beta 1 Multiple Vulnerability RFI Exploits
PHP Photo Album <= (0.4.1.16) Multiple Remote PHP Code Injection Exploits
MyNews v1.2 Remote File Inclusion Vulnerability Exploits

Latest additions : (as of Sept 26 2011)

--------------------------------------------------------------------------------

CA ARCserve D2D r15 GWT Command Execution Exploit
Freefloat FTP 1.0 Any Non Implemented Command Buffer Overflow Exploit
FreeFloat FTP Server ACCL Buffer Overflow Exploit
Freefloat FTP 1.0 ABOR Exploit
MeshCMS v3.5 Remote Code Execution Exploit
PHP Nuke 8.3 MT AFU Shell Upload Vulnerability Exploits
WebSVN 2.3.2 Unproper Metacharacters Escaping exec() Remote Commands Injection Vulnerability Exploits
Sagem Routers Remote Auth Bypass Exploits
Zoneminder 1.24.3 Remote File Inclusion Vulnerability Exploits
WordPress TimThumb Plugin - Remote Code Execution Exploit
Solar FTP 2.1.1 PASV Command PoC Exploits
phpMyAdmin '/scripts/setup.php' CVE-2009-1151 PHP Code Injection RCE PoC v0.11 Exploit
BisonFTP Server <=v3.5 Remote Buffer Overflow Exploits
cdeVision RFI Exploit
Exploit EChat Server <= v2.5 Remote Buffer Overflow Exploit
SYMANTEC AV w/ INTEL FILE TRANSFER SERVICE REMOTE SYSTEM LEVEL Exploits
PlaySMS <= Remote File Inclusion Vulnerability Exploit
Openads-2.0.11 Remote File Inclusion Vulnerability Exploit
SaurusCMS-CE (CommunityEdition) v4.7 RFI Exploits
MiaCMS v4.9.0 Multiple Remote File Inclusion Vulnerability Exploits
724CMS Eneterprise (index.php) (section.php) RFI Exploits
Sunway SCADA Overflow Exploit
Trying BisonFTP Server v3.5 (MKD) Remote BOF Exploit
Pluck CMS 4.7 RFI Exploits
Cerberus FTP Server 4.0.9.8 (REST) Remote BOF Exploit
KnFTPd FTP Server v1.0.0 Multiple Command Remote Buffer Overflow Exploit
FreeFloat FTP Server ACCL Buffer Overflow Exploit
FreeFloat FTP Server REST and PASV Buffer Overflow Exploit
FreeFloat FTP Server MKD Buffer Overflow Exploit
Soulseek 157 NS < 13e & 156.* Remote Peer Search Code Execution Exploit
Freefloat FTP Server DEP Bypass Buffer Overflow Exploit
Relocate Upload Wordpress plugin RFI Exploit
Wpeasystats Wordpress plugin RFI Exploit
Annonces Wordpress plugin RFI Exploit
Thecartpress Wordpress plugin RFI Exploit
Zingiri Web Shop Wordpress plugin RFI Exploits
Mailing List Wordpress plugin RFI Exploit
Disclosure Policy Plugin Wordpress plugin RFI Exploit
KnFTP Buffer Overflow Exploit
KnFTP 1.0.0 Server - 'USER' command - Remote Buffer Overflow Exploit

但是还没写完 本来准备写成服务方式运行的扫描器来着~但是没时间了`配合我刚发的扫描器的代码就可以实现~这个功能也不弱远程用TELNET 就可以连上还可以输入信息~可执行文件运行后开始--运行--telnet 127.0.0.1 1005┏━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━┓┃┏┅┅┅┅┅┅┅┅┅┅┅┅┅┅┓┃ ┃┃┇欢迎使用 Server-SCAN 测试版┇┃ ┃┃┇制作人:黑冰 ┇┃ ┃┃┇O I CQ:3860040 ┇┃ ┃┃┇M ail:szq993@163.com ┇┃ ┃┃┗┅┅┅┅┅┅┅┅┅┅┅┅┅┅┛┃ ┃┗━━━━━━━━━━━━━━━━┻━━━━━━━━━━━━━━━━━━━━━┛ ※━系统信息━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━》 127.0.0.1[hsmjsj] ☆WINDOS系统版本号以及运行模式   系统平台: Windows NT   主版本号: 5   次版本号: 0   次版本号: 0   构建号 : 2195   系统描述: Service Pack 3   运行模式: 正常模式启动 ☆度量信息以及相关配置信息   屏幕 分辨率: 1024*768   窗口边界宽度: 水平方向:1 垂直方向:1   标题栏 高度: 19   鼠标  信息: 已安装鼠标3键鼠标 双击范围4*4   默认光标大小: 32*32   默认图标大小: 32*32 ☆CPU相关信息   CPU个数: 1   CPU类型: CPU类型为奔腾系列 ☆内存相关信息   88%内存在使用   物理内存共有125288448字节   未使用的物理内存共有14323712字节   交换文件的大小为297783296字节   未使用的交换文件的大小为128737280字节   虚拟内存空间大小为2147352576字节   未使用的虚拟内存空间大小为2119753728字节 ☆文件相关信息   系统安装目录: D:WINNT   系统文件路径: D:WINNTSystem32   本程序 位置: E:工程桌面fuwuscanProject1.exe ☆系统注册信息   公司名称:   用户姓名:   序列 号: 52375-270-0090667-05556   注册 码: ※━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━END━》 请输入您要扫描的IP段 例:“192.168.0.1-192.168.0.255” CMD:>
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值