• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Inguma 0.0.6 Released for Download – Free Pen-testing Framework

December 19, 2007

Views: 14,475

[ad]

Quite a few people seem to be interested in this tool, so here is the latest revision – Inguma 0.0.6.

For those that don’t know, Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Inguma Penetration Testing Toolkit

In this new version various things have been added like new modules and improvements in the existing ones. For example the Oracle modules. The Oracle payloads now uses the Cursor Injection method when possible so CREATE PROCEDURE system privilege is not needed to become DBA.

The support for InlineEgg, added in version 0.0.5.1, have been removed and a new completely free library have been added (PyShellCodeLib).

The static analysis framework OpenDis have been enhanced and now you can use the API exposed by OpenDis to write your own binary static analysis tools. As an example of the API, a tool to make binary diffs have been added. Take a look to the file $INGUMA_DIR/dis/asmdiff.py and to the README stored in the same directory.

New 5 exploits for Oracle Databases have been added and the module “sidguess” have been enhanced to retrieve the SID of the database instance from the Enterprise Manager/Database Control banner when possible.

The new modules added to the discover, gather and brute sections are the following:

  • brutehttp: A brute forcer for HTTP servers.
  • extip : A tool to known your external IP address. Very useful to check anonymous proxies.
  • nmbstat : A tool to gather NetBIOS information.
  • ipscan : A tool to make IP protocol scans. The tool check what IP protocols are enabled in the target.
  • arppoison: A tool to poison target’s ARP cache

You can download Inguma 0.0.6 here:

Inguma 0.0.6

Or read more here.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Exploits/Vulnerabilities, Hacking Tools, Password Cracking Tools Tagged With: brute-forcing, information gathering, inguma, Password Cracking, pen testing tools, penetration-testing, toolkit



Reader Interactions

Comments

  1. Sir Henry says

    December 19, 2007 at 1:54 pm

    I downloaded a previous version of Inguma to research a python project on which I am working and, as stated in a previous post for Inguma, I find the modules to be brilliant in their code structure and execution. Right now, it is a baseline reference for me while learning python and figuring out what I want to do with my project.

  2. cpj says

    December 20, 2007 at 3:03 am

    @Sir Henry
    I’m sort of doing the same thing. That is to say I am playing around with the program. At first I had some trouble getting some of the right dependencies to get inguma to work (check the REQUIRES file and you’ll see what I mean) even though some of them are sent with the inguma tarball. One of my friends and I are probing some of our cheap work comps, so it might come in handy. I wish I could find the beauty in the coding: alas, I am only a python novice / My favorite color is blue … no yellow! argg

  3. Sir Henry says

    December 20, 2007 at 4:56 pm

    So far I have only been looking at it as a reference to see how the modules are invoked and what can be done with said modules. My project is in the infancy stage and simply gathering requirements. Once we break through that stage, we will then start testing out different items to see how our project can be a “value-add” (I hate buzzwords, yet seem to use them more than I would like) for us.

  4. Joxean Koret says

    December 20, 2007 at 9:33 pm

    Hi cpj and Sir Henry,

    Can I help you in your projects? And, BTW, what is the problem with the dependencies? Did I missed something?

    Regards

  5. goodpeople says

    December 21, 2007 at 10:39 am

    Haven’t had time to play with it yet. But starting tomorrow I have two weeks off. (christmas vacation, gawd, I love being a teacher)..

  6. Sir Henry says

    December 22, 2007 at 6:20 pm

    @Joxean

    Thanks for the interest, but this is a proprietary project that a friend and I are working on for a consulting gig that we are doing. Should we branch out further in the future, I will let you know.

  7. metafan says

    December 24, 2007 at 7:00 am

    This tool is great, adding metasploit exploits it will replace other commercial high price low quality tools. It seems a potential replacement for them! Once my boss asked me why we were paying for two commercial products when there was metasploit for free, I didn’t know the answer, really. One of the reasons was the reports but I was able to quickly add reporting support to the free tools. I would donate to this project.
    congratulations!

  8. CG says

    December 24, 2007 at 7:27 am

    I have a feeling Joxean might be able to answer any questions on inguma.

    as far as dependencies, the only one that really seems to give people trouble is getting cx_oracle installed.

  9. CG says

    December 24, 2007 at 9:32 pm

    “Once my boss asked me why we were paying for two commercial products when there was metasploit for free, I didn

  10. eM3rC says

    January 6, 2008 at 10:27 pm

    Amazing program!

    Thanks for the post!

  11. Pantagruel says

    March 14, 2008 at 7:53 pm

    Inguma version 0.0.7.2 has been released. In this version new modules and exploits, fixed many, many, many bugs as well as
    enhancing existing modules, such as the Oracle related stuff where added.

    http://inguma.sourceforge.net/

  12. James C says

    March 14, 2008 at 9:30 pm

    @Pantagruel
    thanks for the update

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AgentSmith HIDS - Host Based Intrusion Detection

AgentSmith HIDS – Host Based Intrusion Detection

padre - Padding Oracle Attack Tool

padre – Padding Oracle Attack Exploiter Tool

Privacy Implications of Web 3.0 and Darknets

Privacy Implications of Web 3.0 and Darknets

DataSurgeon - Extract Sensitive Information (PII) From Logs

DataSurgeon – Extract Sensitive Information (PII) From Logs

Pwnagotchi - Maximize Crackable WPA Material For Bettercap

Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap

HardCIDR - Network CIDR and Range Discovery Tool

HardCIDR – Network CIDR and Range Discovery Tool

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (225)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (430)
  • Forensics (64)
  • Hacker Culture (8)
  • Hacking News (228)
  • Hacking Tools (681)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (72)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (218)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,181,175)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,172,340)
  • Top 15 Security Utilities & Download Hacking Tools (2,095,327)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,198,666)
  • Password List Download Best Word List – Most Common Passwords (931,787)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (774,421)
  • Hack Tools/Exploits (672,578)
  • Wep0ff – Wireless WEP Key Cracker Tool (528,830)

Search

Recent Posts

  • AgentSmith HIDS – Host Based Intrusion Detection August 31, 2023
  • padre – Padding Oracle Attack Exploiter Tool May 28, 2023
  • Privacy Implications of Web 3.0 and Darknets March 31, 2023
  • DataSurgeon – Extract Sensitive Information (PII) From Logs March 21, 2023
  • Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap February 12, 2023
  • HardCIDR – Network CIDR and Range Discovery Tool December 29, 2022

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2023 Darknet All Rights Reserved · Privacy Policy