threat9/routersploit Exploitation Framework for Embedded Devices

它有這些功能

exploits - modules that take advantage of identified vulnerabilities
creds - modules designed to test credentials against network services
scanners - modules that check if a target is vulnerable to any exploit
payloads - modules that are responsible for generating payloads for various architectures and injection points
generic - modules that perform generic attacks

下載

git clone https://github.com/reverse-shell/routersploit

必要元件安裝

cd routersploit
python3 -m pip install -r requirements.txt

執行

python3 rsf.py

我就用基本的掃描動作
指定目標 IP
開始掃描 (我拿一台 Linux 當作是 router 掃)
(假如不知道詳細指令都可以按 tab 鍵出現提示,或 help )

> use scanners/routers/router_scan
> set target 10.10.10.137
> run

它就掃出我密碼用 123456

( 其它省略)

[-] 10.10.10.137 Could not confirm any vulnerablity

[+] 10.10.10.137 Found default credentials:

   Target           Port     Service     Username     Password     
   ------           ----     -------     --------     --------     
   10.10.10.137     22       ssh         root         123456
Related posts 相關文章
線上弱點、惡意病毒掃描廠商
More...
測試網站 malware 惡意/病毒程式掃描
More...
Linux 一直有 martian source 訊息出現
More...
NMAP 指令,掃 IP,掃 OS,掃 port
More...

作者

留言

撰寫回覆或留言

發佈留言必須填寫的電子郵件地址不會公開。