Black Window Enterprise 10 v2 – Distribución de pentesting, basada en Windows

Black Window Enterprise 10 v2 - Distribución de penetration testing basada en Windows
DESCRIPCIÓN

Black Window Enterprise 10 v2 – Distribución de pentesting, basada en Windows, con Linux integrado. ¡El sistema viene activado con una licencia digital para Windows Enterprise! ¡Es compatible con aplicaciones de Windows y Linux, GUI y aplicaciones de terminal! Viene con un tono de herramientas de pirateo más todas las herramientas que se incluyen con la última versión de Cerberus Linux. Ha logrado implementar Cerberus os dentro de Windows. Ofrece la estabilidad de un sistema de Windows

DATOS TÉCNICOS

Black Window Enterprise 10 v2

Peso: 28.9 GB | Idioma: Ingles | Licencia: Kms |

NOVEDADES

3 zip files Black Window 10 Enterprise Codename: Polemos ( 28 gigabytes)
1 deb(Linux installer) file to install all new tools for Cerberus
ExpressVPN: High-Speed, Secure & Anonymous VPN Service for 1 year
Botnets Collection Pack
Rat’s Collection Pack
Crypers Collection Pack

Tools Preinstalled
Windows :
Armitage
Metasploit
Fuzzbunch
Dandensprits
Ip hiders
Wifi hacking
Crackers
Cypters and Binders
Dork Scanners
Dos+DDoser++Flooders
Forensic Tools
over 100 new KeyLoggers updated
Misc. Web Tools
over 50 new SQL Injection tools updated
over 50 new Network Tools updated
over 100 RAT’ s updated
SMS & Email Bombers
VPNs & Security
Admin Page-Login Page Scanners
Proxy Grabbers
Resolvers
Scripts & Source Codes
Shells
Vulnerable Scanners
Worms, Malware, & Virus Makers
Entire Elcomsoft

Linux:
All tools from Cerberus os!
15 new Cerberus Frameworks :
Metapackages , containers with custom scripts within!

Exploits (to analyze):
EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit
EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86.
ECHOWRECKER remote Samba 3.0.x Linux exploit.
EASYBEE appears to be an MDaemon email server vulnerability
EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6
EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet
EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2
EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor
ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)
EDUCATEDSCHOLAR is a SMB exploit (MS09-050)
EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061)
EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2
ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client’s side to send an email to other users
EPICHERO 0-day exploit (RCE) for Avaya Call Server
ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003
ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)
ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010)
ETERNALCHAMPION is a SMBv1 exploit
ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers
ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003
ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)
ETRE is an exploit for IMail 8.10 to 8.22
ETCETERABLUE is an exploit for IMail 7.04 to 8.05
FUZZBUNCH is an exploit framework, similar to MetaSploit
ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors
EXPIREDPAYCHECK IIS6 exploit
EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release
EASYFUN WordClient / IIS6.0 exploit
ESSAYKEYNOTE
EVADEFRED

Utilities:
PASSFREELY utility which “Bypasses authentication for Oracle servers”
SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE
ERRATICGOPHERTOUCH Check if the target is running some RPC
IISTOUCH check if the running IIS version is vulnerable
RPCOUTCH get info about windows via RPC
DOPU used to connect to machines exploited by ETERNALCHAMPIONS
NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes.

Scripts Arsenal and Wine Arsenal:
Nsa Tools,
Vulnerability Analysis,
Exploitation Tools,
Wireless Attacks,
Forensics Tools,
Web Applications,
Stress Testing,
Sniffing & Spoofing,
Password Attacks,
Maintaining Access,
Hardware Hacking,

REQUERIMIENTOS DEL SISTEMA

Procesador: Procesador a 3 GHz o más rápido o sistema en un chip (SoC)
RAM: 4 GB
Espacio en disco duro: 120 GB
Tarjeta gráfica: DirectX 9 o posterior con un controlador WDDM 1.0
Pantalla: 800×600
Conexión a Internet
Último sistema operativo: Asegúrate de que estás ejecutando la versión más reciente: Windows 7 SP1 o Windows 8.1 Update

CAPTURAS
ENLACES PRIVADOS SIN PUBLICIDAD

Para ver los enlaces necesita estar Registrado

Black Window Enterprise 10 v2

ENLACES PÚBLICOS CON PUBLICIDAD

Black Window Enterprise 10 v2

 |

CONTRASEÑA/PASSWORD PARA DESCOMPRIMIR

www.bacterias.mx

WEB DEL AUTOR

cybeseclabs

One Comment

Add a Comment

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *