DLSS Posted April 7, 2009 Share Posted April 7, 2009 i was doubting if i was going to post this because even tho its similar to autopwn on linux (not the same thing or author) and metasploit, the description isn't exactly whitehat, even tho it can be used for such ... anyway : source : http://winautopwn.co.nr/ WINDOWS AUTOPWN (WINAUTOPWN) Autohack your targets with least possible interaction. Features : - Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits. - No need to debug, script or compile the source codes. - Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to the list of discovered open ports (OpenPorts.TXT) - PortScan is multi-threaded. - Doesn't require any Database at the back-end like msf - Can be also be used to test effectiveness of IDS/IPS - Launched exploits are independent and doesn't rely on service fingerprinting (to avoid evasion, if any) The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is easy to use and doesn't require a lot of support of other dependencies. Also not forgetting that winAUTOPWN unlike other frameworks maintains the original exploit writer's source code intact just as it was and uses it. This way the exploit writer's credit and originality is maintained. The source is modified only when required to enable a missing feature or to remove hard-coded limitations. Under these circumstances also, the exploit writers credits remain intact. Newer exploit modules are added as and when they release and older ones are also being daily added. Binaries of perl, php, python and cygwin DLLs (included) are required to exist either in a common folder or should be properly installed with their paths registered for those exploits which are cannot be compiled into a PE-exe. Some anti-viruses might falsely detect the exploits as malicious. Future : - A separate DragonflyBSD-server is being set up which will hold the exploit repository and the next version will autosync the exploits from them in the appropriate folder. NOTE : In case of emergency, Press "Q" / "q" anytime to EXIT the program. NOTE : This program winAUTOPWN is released under the WTFPL (http://sam.zoy.org/wtfpl/) Quote Link to comment Share on other sites More sharing options...
dr0p Posted April 7, 2009 Share Posted April 7, 2009 Just tried it, not nearly as nice as the linux version but it's still pretty functional. Quote Link to comment Share on other sites More sharing options...
dred Posted April 13, 2009 Share Posted April 13, 2009 Ill check it out Thanks for the info when iam done I will let you know what i think Quote Link to comment Share on other sites More sharing options...
twist3r Posted June 19, 2009 Share Posted June 19, 2009 it seems that the site is down and that it was apparently infected (info here) does anyone know where to find this? I'd like to try it, thanks Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.