<<< Date Index >>>     <<< Thread Index >>>

New release of the Auditor Security Collection available at http://www.remote-exploit.org



I am proud to announce the release of the new version of the Auditor
Security Collection CD-ROM. We put in a lot of effort to bring it into
that final look and feel. It seems to be the best version released
ever. Not only because of its completeness, no it seems to be the most
stable and bugfree version.
>
>
> '''!!IMPORTANT!!''' You will see that in this version you have to choose 
> between two different ISO versions. This has to be done because systems with 
> an integrated Intel b/g chip based wireless card will not boot with the 
> ipw2100 driver on the cd. '''If you want to be able to use Auditor Security 
> Collection on a system with an IPW2200 card you need to download the 
> "-no-ip2100"''' version of the iso otherwise it will not boot.
>
> Copy & Paste from Changes:
>
> First of all there are now released two different iso's:
>
> ==== auditor-200605-02-no-ipw2100.iso: ====
> This version works with all systems including the laptops with intel B/G 
> cards (ipw2200). Because there is not ipw2100 driver included, ipw2100 based 
> intel B only wireless cards will not work. If you own/work on a system with 
> an ipw2100 take the other iso, in any other case it is safe to take this one.
>
> ==== auditor-200605-02-ipw2100.iso: ====
> This version got the intel ipw2100 driver built int. This version will not 
> work on systems which has ipw2200 based wireless cards built in. I repeat, 
> dont use this version if you have an intel b/g wireless network card which is 
> based on the ipw2200 driver. If you own a system with an ipw2200 supported 
> card, take the other iso. All other should run fine.
>
> Sorry for that hassle about that damn ipw2200 instability, i hope the driver 
> projects will fix their incompatibility soon so we can merge together. The 
> funny thing is, that the ipw2100 card dont give a damn about the ipw2200 
> driver, but the ipw2200 system are hanging during booth, when an ipw2100 
> driver is probed during autodetection.
>
> ==== New & Updated tools: ====
> * proxychains 1-8-1 (for example scanning over proxy more easy)
> * yersinia-0.5.4
> * kismet-logfile-viewer klv.pl and klc.pl
> * ntp fingerprinting tool
> * tftp bruteforce tool
> * snmp fuzzer
> * cisco torch 0.4b
> * unicornscan 0.4.2
> * packit
> * sendip
> * nasl 2.2.4
> * tcpick
> * cryptcat
> * amap version 4.8
> * tcpsplit
> * Ethereal version 10.11
> * ettercap-ng-0.72 and modified the etter.conf
> * replaced tinysnmp with snmp tools
> * vnc2swf /usr/X11R6/bin/recordwin and vnc2swf
> * edit_vnc2swf.py
> * edit_mp3.py
> * wpa-supplicatiant 0.3.8
> * hostapd-utils 0.3.7
> * ssldump
> * fragrouter
> * Metasploit 2.4 including all known updates
> * airsnarf, but no menu at moment
> * fakeap to /opt/auditor but no menu entry at moment, need to write a shell 
> script
> * dsniff 2.4b1-10
> * nessus plugins updated
> * exploit tree updated
> * Snort 2.3.2-5
> * Bleeding-edge rules for snort
> * New aircrack
> * New airsnort
> * Bet i forgot some to mention.
>
> ==== New & updated drivers: ====
> * rt2400 linux drivers and utils (untested)
> * rtl8180 driver (8180_26_private.ko and open8180.ko and 
> /usr/local/bin/wlanup and /usr/local/bin/wlandown) (Untested)
> * hostap drivers 0.3.7
> * ipw2100 & ipw2200 incl firmware, incl monitor mode
> * Prism54 with injection patch
> * Linux-wlan-ng with injection patch
> * Madwifi with injection patch
> * ACX drivers are back on cd
>
> ==== Addons: ====
> * Default password list has been updated
> * Added some changes to the network stack using /etc/sysctl.conf, which will 
> be called from knoppix-autoconfig script
> * New background image
>
> ==== Some fixes i remember: ====
> * Kernel completely rebuilded to provide full functionality
> * Isolinux now accepts bootparameters again
> * USB drivers are back to /dev/sda and booting from stick works fine>
> * grub files have been fixed
> * fixed hostname /etc/hosts
> * /cdrom/index.html pointed to the old forum fixed that
> * Added cardctl eject, cardctl insert into switch-to-XY scripts
> * Fixed the homebutton of the konquerror when clicked first time
> * Fixed the menuentry for nessus
>
> Greetings
>
> max
> __________________
> http://www.remote-exploit.org <http://www.remote-exploit.org>
> -----------------------------
> HOME OF THE AUDITOR SECURITY COLLECTION
>