The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:
The routersploit is a similar tool to Metasploit, very easy to create more modules. Anyone can extend the tool easily with the help of exploit databases.
To get the code skeleton.
Also Read p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Penetration Testing Tool.
It is a critical vulnerability that allows an attacker to take remote control of a router connected to the Internet and it can be fixed only by hardware vendors.
root@kali:~# routersploit rsf > use exploits/multi/misfortune_cookie rsf (Misfortune Cookie) > show optionsScanner Quickly checks the target is vulnerable to any exploit, here we are to use autopwn scanners for all vulnerabilities.
rsf use scanner/autopwn rsf (Autopwn) > show options rsf (Autopwn) > set target IP rsf (Autopwn) > runRouterSploit has various creds modules that can brute force various services, including HTTP, SSH, and Telnet.
As like every brute force tool you should prepare a wordlist, every service has two modules for reference (ftp_bruteforce,ftp_default)
ftp_default as the name indicates will check for default credentials and the process will be completed in minutes.
ftp_bruteforce does a dictionary account over single or multiple user accounts with credentials provided in the list.
You can find the video Tutorial on the GitHub page.
Also, Read
Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…
Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…
In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…
Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…
Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…
Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…
View Comments
I appreciate the article as it lays out the setup guide very nicely. Is the autopwn scanner passive? I would like to attempt to passively determine if the device is prone to the vulnerability rather than exploiting it.