
I-RoutterpLoit Ingabe uhlaka lokuxhashazwa olumangalisayo lwenzelwe ngqo amadivayisi ashumekiwe.
Leli thuluzi lingasetshenziswa yiPentester ukuskena ukuphepha kwamakhamera nama-routers.
Ama-RoutterpLpliat avelele avelele:
- Inamakhodi ku-python.
- Isikhombimsebenzisi se-command-line.
- Ukuxhaswa kweDocker.
- Amathuluzi ajwayelekile.
Os osekelwayo:
- I-Macos.
- I-Linux.
- Ucingo lwe-Android.
- I-Windows.
Ukufaka i-routersploit:
Izidingo:
- -phambili
- izicelo
- Umanjana
- Ima
- Pycrypto
-Nokukhetha ngokuthanda:
- -nepakepy – I-Bluetooth Low Energy
Ukufaka eKali Linux:
Landela imiyalo engezansi:
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
I-Bluetooth Low Energy ukweseka:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.pyUkufaka ku-Ubuntu:
Landela imiyalo engezansi:
sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py
I-Bluetooth Low Energy ukweseka:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.pyUkufaka kuma-macos:
Landela imiyalo engezansi:
git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.pyUkufaka ku-Docker:
Landela imiyalo engezansi:
git clone https://www.github.com/threat9/routersploit
cd routersploit
docker build -t routersploit .
docker run -it --rm routersploitUngawuvuselela kanjani i-roulsploit?
Udinga ukubuyekeza ama-roelploupliet kaningi ukugwema ukuphazamiseka.
Amamojula amasha athunyelwa cishe nsuku zonke.
cd routersploit
git pullUngayisebenzisa kanjani i-routersploit?
Umsebenzi
Root @ Kaidiyo:~ / GIT / routersploit # ./rsf.py ______ _ _____ _ _ _ | ___ \ | | / ___| | | (_) | | |_ / / ___ _ _| |_ ___ _ `-. _ __ | | ___ _ _| |_ | // _ \| | | | __ / _ \ '__|`-. \ '_ \| |/ _ \| | __| | |\ \ (_) | |_| | || __ / | /\__ / / |_) | | (_) | | |_ _| \_ ___ / __ __ __,_|\__ __ ___|_| \____ /| .__ /|_|\___ /|_|\__| | | UHLELO LOKUXHUMANA |_| ngengozi9 Amadivayisi ashumekiwe Cowedame : Bengazi ukuthi uyinkinga Ukuhumushela : 3.3.0 Ikhasi eliyikhaya : I-HTTPS://www.threat9.com/ - @threatnine Joyina Slack : roulerploit.slack.com Joyina UHlelo lweNsongo lweBeta - I-HTTPS://www.threat9.com/ Kusebenza: 128 Izikena: 4 Amakhredi: 165 Jengana: 4 Ukulayisha: 32 Abaqambi: 6 I-RSF >
Kusebenza:
Ukulungiselela ukuxhashazwa, Vele ukhethe imodyuli bese usetha ilitshe:
I-RSF > Sebenzisa ukuxhaphaza / isebenzisana / 2wire / ukuxhaphaza / i-asmax / ukuxhashazwa / i-Asus / i-CISCO / ukuxhaphaza / i-Dlink / ukuxhashazwa / izixhumanisi / ukuxhaphaza / ukuxhaphaza / ukuxhashazwa / ukuxhashazwa / I-RSF > Sebenzisa i-Exploits / Dlink / Dir_300_600_RCE I-RSF (D-Link dir-300 & Dir-600 RE) >
Okokugcwalisa Sebenzisa ukhiye wethebhu.
Ukubonisa Izinketho, ukuthayiphashow:
I-RSF (D-Link dir-300 & Dir-600 RE) > Khombisa Izinketho Izinketho zethagethi: Incazelo yezilungiselelo zamanje ---- ---------------- ----------- Ikheli eliqondiwe eliqondisiwe e.g. http://192.168.1.1 itheku 80 I-Target Port
Umsebenzirun nomaexploit iyala ukuxhaphaza ilitshe:
I-RSF (D-Link dir-300 & Dir-600 RE) > gijima [+] Ithagethi isengozini [*] Ukunxusa umyalo we-loop ... cmd > ngingubani mina impande
Ukusetha Izinketho:
I-RSF (D-Link dir-300 & Dir-600 RE) > Setha i-Target http://192.168.1.1 [+] {'target': 'http://192.168.1.1'}
Kungenzeka ukubheka ukuthi ilitshe lisengcupheni ukuxhaphaza okuthile:
I-RSF (D-Link dir-300 & Dir-600 RE) > -hlola [+] Ithagethi isengozini
Gijimashow info Ukubonisa imininingwane mayelana nokuxhaphaza.
Ukuskena ngezinhloso ezisengozini:
Izikena zivumela ngokushesha ukuqinisekisa uma ilitshe lisengcupheni kunoma yikuphi ukuxhaphaza.
Sebenzisa imiyalo efanayo ukukhombisa / ukusetha izinketho, futhi ukugijima.
I-RSF (Isithwebuli se-D-Link) > gijima [+] isebenzisana / dlink / drm_932_info_disclosul isengozini [-] isebenzisana / dlink / dir_300_320_615_auth_bypass ayisengozini [-] isebenzisana / dlink / dsl_2750b_info_disclosul akuyona ingozi [-] isebenzisana / dlink / DNS_320L_327L_RCE akuyona ingozi [-] i-appleits / dlink / dir_645_password_disclosure akuyona ingozi [-] isebenzisana / dlink / dir_300_600_615_info_disclosul akuyona ingozi [-] isebenzisana / dlink / dir_300_600_rce ayikho engcupheni [+] Idivaysi isengozini! - isebenzisana / i-dlink / drm_932_info_disclosure
Funda Futhi: 1337ummeleli x
Amagama wokugcina:
I-RoutterpLoit iyithuluzi elimangalisayo elizolisebenzisa.
Uma ubhekana nanoma yiziphi izingqinamba mayelana I-RoutterpLoit. Qiniseka ukuthi ubeke amazwana phansi ngezansi. Iqembu lethu Cshawk lizoxhumana nawe asap.