top of page
Search
downcontdihumbmis

RouterSploit: How to Find and Exploit Vulnerabilities in Embedded Systems



Similar to the Metasploit Framework, the RouterSploit Framework is an open source exploitation framework to exploit embedded devices, specifically routers by Threatnine ( ). The tool can be installed to Kali by just running apt-get install routersploit from the Terminal. The latest version of RouterSploit is 3.4.0 and it comes with 130 known exploits and 4 different scanners, depending on the device type.




RouterSploit




Short video that will show you how to run a "autopwn" feature, and set variables accordingly: =1You can always go back and read the git page for additional information: -shell/routersploit


InstallationRequirementsgnureadline (OSX only)requestsparamikobeautifulsoup4pysnmpInstallation on Kaligit clone -shell/routersploitcd routersploit./rsf.pyInstallation on Ubuntu 16.04sudo apt-get install python-dev python-pip libncurses5-dev gitgit clone -shell/routersploitcd routersploitpip install -r requirements.txt./rsf.pyInstallation on OSXgit clone -shell/routersploitcd routersploitsudo easy_install pipsudo pip install -r requirements.txt./rsf.pyRunning on Dockergit clone -shell/routersploitcd routersploitdocker build -t routersploit:latest -f Dockerfile ../run_docker.shUpdatecd routersploitgit pull Usageroot@kalidev:/git/routersploit# ./rsf.py ______ _ _____ _ _ _ ___ \ / ___ (_) _/ /___ _ _ _ ___ _ __\ `--. _ __ ___ _ _ // _ \ __/ _ \ '__`--. \ '_ \ / _ \ __ \ \ (_) _ __/ /\__/ / _) (_) _ \_ \_\___/ \__,_\__\____ \____/ .__/_\___/_\__ Router Exploitation Framework _ Dev Team : Marcin Bury (lucyoa) & Mariusz Kupidura (fwkz) Codename : Wildest Dreams Version : 1.0.0rsf > Copyright 2016, The RouterSploit Framework (RSF) by Reverse Shell SecurityShareezoicSiteSpeed(jQuery,String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function($)$('head').append($('',id:'hide-sharre-count',type:'text/css',html:'.sharrre-container.no-counter .box .count display:none;'));$('#twitter').sharrre(share:twitter:true,template:'',enableHover:false,enableTracking:true,buttons:twitter:via:'the_yellow_fall',click:function(api,options)api.simulateClick();api.openPopup('twitter'););$('#facebook').sharrre(share:facebook:true,template:'',enableHover:false,enableTracking:true,buttons:layout:'box_count',click:function(api,options)api.simulateClick();api.openPopup('facebook'););$('#pinterest').sharrre(share:pinterest:true,template:'',enableHover:false,enableTracking:true,buttons:pinterest:description:'routersploit v3.4.0 released: Router Exploitation Framework',media:' -content/uploads/2017/05/router-1.png',click:function(api,options)api.simulateClick();api.openPopup('pinterest'););$('#linkedin').sharrre(share:linkedin:true,template:'',enableHover:false,enableTracking:true,buttons:linkedin:description:'routersploit v3.4.0 released: Router Exploitation Framework',media:' -content/uploads/2017/05/router-1.png',click:function(api,options)api.simulateClick();api.openPopup('linkedin'););var $_shareContainer=$(".sharrre-container"),$_header=$('#header'),$_postEntry=$('.entry'),$window=$(window),startSharePosition=$_shareContainer.offset(),contentBottom=$_postEntry.offset().top+$_postEntry.outerHeight(),topOfTemplate=$_header.offset().top,topSpacing=_setTopSpacing();shareScroll=function()var scrollTop=$window.scrollTop()+topOfTemplate,stopLocation=contentBottom-($_shareContainer.outerHeight()+topSpacing);$_shareContainer.css(position:'fixed');if(scrollTop>stopLocation)$_shareContainer.css(position:'relative');$_shareContainer.offset(top:contentBottom-$_shareContainer.outerHeight(),left:startSharePosition.left,);else if(scrollTop>=$_postEntry.offset().top-topSpacing)$_shareContainer.css(position:'fixed',top:'100px');$_shareContainer.offset(left:startSharePosition.left,);else if(scrollTop1024)topSpacing=distanceFromTop+$('.nav-wrap').outerHeight();elsetopSpacing=distanceFromTop;return topSpacing;$window.on('scroll',ezoicSiteSpeed(objOrFunction:_.throttle,object:_,function:String(/throttle/).substring(1).slice(0,-1),String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function()if($window.width()>719)shareScroll();else$_shareContainer.css(top:'',left:'',position:''),50));$window.on('resize',ezoicSiteSpeed(objOrFunction:_.debounce,object:_,function:String(/debounce/).substring(1).slice(0,-1),String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function()if($window.width()>719)shareMove();else$_shareContainer.css(top:'',left:'',position:''),50)););if(typeof ez_ad_units!='undefined')ez_ad_units.push([[970,90],'securityonline_info-banner-1','ezslot_9',105,'0','0']);__ez_fad_position('div-gpt-ad-securityonline_info-banner-1-0');Tags: routersploitNext story enumerid: Enumerate RIDs using pure PythonPrevious story wirespy v0.6 releases: Automate Man In The Middle Attacks over WiFiezoicSiteSpeed(jQuery,String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function($)var _fireWhenCzrAppReady=function()czrapp.proRelPostsRendered=$.Deferred();var waypoint=new Waypoint(element:document.getElementById('pro-related-posts-wrapper'),handler:function(direction)if('pending'==czrapp.proRelPostsRendered.state())var $wrap=$('#pro-related-posts-wrapper');$wrap.addClass('loading');czrapp.doAjax(action:"ha_inject_pro_related",related_post_id:11918,pro_related_posts_opt:"id":"pro_related_posts_czr_module","title":"","enable":true,"col_number":3,"display_heading":true,"heading_text":"You may also like...","freescroll":false,"ajax_enabled":true,"post_number":10,"order_by":"rand","related_by":"categories",free_related_posts_opt:"1",layout_class:"col-2cl").done(function(r)if(r&&r.data&&r.data.html)if('pending'==czrapp.proRelPostsRendered.state())$.when($('#pro-related-posts-wrapper').append(r.data.html)).done(function()czrapp.proRelPostsRendered.resolve();$wrap.find('.czr-css-loader').css('opacity',0);ezoicSiteSpeed(objOrFunction:_.delay,object:_,function:String(/delay/).substring(1).slice(0,-1),String(/documentReady/).substring(1).slice(0,-1),String(/jQuery-document-ready/).substring(1).slice(0,-1),function()$wrap.removeClass('loading').addClass('loaded');,800);););,offset:'110%');;if(window.czrapp&&czrapp.methods&&czrapp.methods.ProHeaderSlid)_fireWhenCzrAppReady()elsedocument.addEventListener('czrapp-is-ready',_fireWhenCzrAppReady););Follow:Search 2ff7e9595c


0 views0 comments

Recent Posts

See All

Ufc jogo

UFC Game: Tudo o que você precisa saber sobre a série de videogames do Ultimate Fighting Championship Se você é fã de artes marciais...

Commentaires


bottom of page