New release of the Auditor Security Collection available at http://www.remote-exploit.org

From: Max Moser (max.moser@gmail.com)
Date: Wed Jun 22 2005 - 09:46:45 EDT


I am proud to announce the release of the new version of the Auditor
Security Collection CD-ROM. We put in a lot of effort to bring it into
that final look and feel. It seems to be the best version released
ever. Not only because of its completeness, it seems to be the most
stable and bugfree version too.

 '''!!IMPORTANT!!''' You will see that in this version you have to
choose between two different ISO versions. This has to be done because
systems with an integrated Intel b/g chip based wireless card will not
boot with the ipw2100 driver on the cd. '''If you want to be able to
use Auditor Security Collection on a system with an IPW2200 card you
need to download the "-no-ip2100"''' version of the iso otherwise it
will not boot.

 Copy & Paste from Changes:

 First of all there are now released two different iso's:

 ==== auditor-200605-02-no-ipw2100.iso: ====
 This version works with all systems including the laptops with intel
B/G cards (ipw2200). Because there is not ipw2100 driver included,
ipw2100 based intel B only wireless cards will not work. If you
own/work on a system with an ipw2100 take the other iso, in any other
case it is safe to take this one.

 ==== auditor-200605-02-ipw2100.iso: ====
 This version got the intel ipw2100 driver built int. This version
will not work on systems which has ipw2200 based wireless cards built
in. I repeat, dont use this version if you have an intel b/g wireless
network card which is based on the ipw2200 driver. If you own a system
with an ipw2200 supported card, take the other iso. All other should
run fine.

 Sorry for that hassle about that damn ipw2200 instability, i hope
the driver projects will fix their incompatibility soon so we can
merge together. The funny thing is, that the ipw2100 card dont give a
damn about the ipw2200 driver, but the ipw2200 system are hanging
during booth, when an ipw2100 driver is probed during autodetection.

 ==== New & Updated tools: ====
 * proxychains 1-8-1 (for example scanning over proxy more easy)
 * yersinia-0.5.4
 * kismet-logfile-viewer klv.pl and klc.pl
 * ntp fingerprinting tool
 * tftp bruteforce tool
 * snmp fuzzer
 * cisco torch 0.4b
 * unicornscan 0.4.2
 * packit
 * sendip
 * nasl 2.2.4
 * tcpick
 * cryptcat
 * amap version 4.8
 * tcpsplit
 * Ethereal version 10.11
 * ettercap-ng-0.72 and modified the etter.conf
 * replaced tinysnmp with snmp tools
 * vnc2swf /usr/X11R6/bin/recordwin and vnc2swf
 * edit_vnc2swf.py
 * edit_mp3.py
 * wpa-supplicatiant 0.3.8
 * hostapd-utils 0.3.7
 * ssldump
 * fragrouter
 * Metasploit 2.4 including all known updates
 * airsnarf, but no menu at moment
 * fakeap to /opt/auditor but no menu entry at moment, need to write
a shell script
 * dsniff 2.4b1-10
 * nessus plugins updated
 * exploit tree updated
 * Snort 2.3.2-5
 * Bleeding-edge rules for snort
 * New aircrack
 * New airsnort
 * Bet i forgot some to mention.

 ==== New & updated drivers: ====
 * rt2400 linux drivers and utils (untested)
 * rtl8180 driver
 * hostap drivers 0.3.7
 * ipw2100 & ipw2200 incl firmware, incl monitor mode
 * Prism54 with injection patch
 * Linux-wlan-ng with injection patch
 * Madwifi with injection patch
 * ACX drivers are back on cd

 ==== Addons: ====
 * Default password list has been updated
 * Added some changes to the network stack using /etc/sysctl.conf,
which will be called from knoppix-autoconfig script
 * New background image

 ==== Some fixes i remember: ====
 * Kernel completely rebuilded to provide full functionality
 * Isolinux now accepts bootparameters again
 * USB drivers are back to /dev/sda and booting from stick works fine>
 * grub files have been fixed
 * fixed hostname /etc/hosts
 * /cdrom/index.html pointed to the old forum fixed that
 * Added cardctl eject, cardctl insert into switch-to-XY scripts
 * Fixed the homebutton of the konquerror when clicked first time
 * Fixed the menuentry for nessus

 Greetings

 max
 __________________
 http://www.remote-exploit.org



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:28 EDT