Similar to the Metasploit Framework, the RouterSploit Framework is an open source exploitation framework to exploit embedded devices, specifically routers by Threatnine ( ). The tool can be installed to Kali by just running apt-get install routersploit from the Terminal. The latest version of RouterSploit is 3.4.0 and it comes with 130 known exploits and 4 different scanners, depending on the device type.
RouterSploit
Download: https://ssurll.com/2vzomp
Short video that will show you how to run a "autopwn" feature, and set variables accordingly: =1You can always go back and read the git page for additional information: -shell/routersploit
InstallationRequirementsgnureadline (OSX only)requestsparamikobeautifulsoup4pysnmpInstallation on Kaligit clone -shell/routersploitcd routersploit./rsf.pyInstallation on Ubuntu 16.04sudo apt-get install python-dev python-pip libncurses5-dev gitgit clone -shell/routersploitcd routersploitpip install -r requirements.txt./rsf.pyInstallation on OSXgit clone -shell/routersploitcd routersploitsudo easy_install pipsudo pip install -r requirements.txt./rsf.pyRunning on Dockergit clone -shell/routersploitcd routersploitdocker build -t routersploit:latest -f Dockerfile ../run_docker.shUpdatecd routersploitgit pull Usageroot@kalidev:/git/routersploit# ./rsf.py ______ _ _____ _ _ _ ___ \ / ___ (_) _/ /___ _ _ _ ___ _ __\ `--. _ __ ___ _ _ // _ \ __/ _ \ '__`--. \ '_ \ / _ \ __ \ \ (_) _ __/ /\__/ / _) (_) _ \_ \_\___/ \__,_\__\____ \____/ .__/_\___/_\__ Router Exploitation Framework _ Dev Team : Marcin Bury (lucyoa) & Mariusz Kupidura (fwkz) Codename : Wildest Dreams Version : 1.0.0rsf > Copyright 2016, The RouterSploit Framework (RSF) by Reverse Shell SecurityShareezoicSiteSpeed(jQuery,String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function($)$('head').append($('',id:'hide-sharre-count',type:'text/css',html:'.sharrre-container.no-counter .box .count display:none;'));$('#twitter').sharrre(share:twitter:true,template:'',enableHover:false,enableTracking:true,buttons:twitter:via:'the_yellow_fall',click:function(api,options)api.simulateClick();api.openPopup('twitter'););$('#facebook').sharrre(share:facebook:true,template:'',enableHover:false,enableTracking:true,buttons:layout:'box_count',click:function(api,options)api.simulateClick();api.openPopup('facebook'););$('#pinterest').sharrre(share:pinterest:true,template:'',enableHover:false,enableTracking:true,buttons:pinterest:description:'routersploit v3.4.0 released: Router Exploitation Framework',media:' -content/uploads/2017/05/router-1.png',click:function(api,options)api.simulateClick();api.openPopup('pinterest'););$('#linkedin').sharrre(share:linkedin:true,template:'',enableHover:false,enableTracking:true,buttons:linkedin:description:'routersploit v3.4.0 released: Router Exploitation Framework',media:' -content/uploads/2017/05/router-1.png',click:function(api,options)api.simulateClick();api.openPopup('linkedin'););var $_shareContainer=$(".sharrre-container"),$_header=$('#header'),$_postEntry=$('.entry'),$window=$(window),startSharePosition=$_shareContainer.offset(),contentBottom=$_postEntry.offset().top+$_postEntry.outerHeight(),topOfTemplate=$_header.offset().top,topSpacing=_setTopSpacing();shareScroll=function()var scrollTop=$window.scrollTop()+topOfTemplate,stopLocation=contentBottom-($_shareContainer.outerHeight()+topSpacing);$_shareContainer.css(position:'fixed');if(scrollTop>stopLocation)$_shareContainer.css(position:'relative');$_shareContainer.offset(top:contentBottom-$_shareContainer.outerHeight(),left:startSharePosition.left,);else if(scrollTop>=$_postEntry.offset().top-topSpacing)$_shareContainer.css(position:'fixed',top:'100px');$_shareContainer.offset(left:startSharePosition.left,);else if(scrollTop1024)topSpacing=distanceFromTop+$('.nav-wrap').outerHeight();elsetopSpacing=distanceFromTop;return topSpacing;$window.on('scroll',ezoicSiteSpeed(objOrFunction:_.throttle,object:_,function:String(/throttle/).substring(1).slice(0,-1),String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function()if($window.width()>719)shareScroll();else$_shareContainer.css(top:'',left:'',position:''),50));$window.on('resize',ezoicSiteSpeed(objOrFunction:_.debounce,object:_,function:String(/debounce/).substring(1).slice(0,-1),String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function()if($window.width()>719)shareMove();else$_shareContainer.css(top:'',left:'',position:''),50)););if(typeof ez_ad_units!='undefined')ez_ad_units.push([[970,90],'securityonline_info-banner-1','ezslot_9',105,'0','0']);__ez_fad_position('div-gpt-ad-securityonline_info-banner-1-0');Tags: routersploitNext story enumerid: Enumerate RIDs using pure PythonPrevious story wirespy v0.6 releases: Automate Man In The Middle Attacks over WiFiezoicSiteSpeed(jQuery,String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function($)var _fireWhenCzrAppReady=function()czrapp.proRelPostsRendered=$.Deferred();var waypoint=new Waypoint(element:document.getElementById('pro-related-posts-wrapper'),handler:function(direction)if('pending'==czrapp.proRelPostsRendered.state())var $wrap=$('#pro-related-posts-wrapper');$wrap.addClass('loading');czrapp.doAjax(action:"ha_inject_pro_related",related_post_id:11918,pro_related_posts_opt:"id":"pro_related_posts_czr_module","title":"","enable":true,"col_number":3,"display_heading":true,"heading_text":"You may also like...","freescroll":false,"ajax_enabled":true,"post_number":10,"order_by":"rand","related_by":"categories",free_related_posts_opt:"1",layout_class:"col-2cl").done(function(r)if(r&&r.data&&r.data.html)if('pending'==czrapp.proRelPostsRendered.state())$.when($('#pro-related-posts-wrapper').append(r.data.html)).done(function()czrapp.proRelPostsRendered.resolve();$wrap.find('.czr-css-loader').css('opacity',0);ezoicSiteSpeed(objOrFunction:_.delay,object:_,function:String(/delay/).substring(1).slice(0,-1),String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function()$wrap.removeClass('loading').addClass('loaded');,800);););,offset:'110%');;if(window.czrapp&&czrapp.methods&&czrapp.methods.ProHeaderSlid)_fireWhenCzrAppReady()elsedocument.addEventListener('czrapp-is-ready',_fireWhenCzrAppReady););Follow:Search 2ff7e9595c
Commentaires