Skip to content

Men Of Letters Archives

Knowledge is Power

  • Home
  • Official Website
  • Ancient-Wisdom
  • Health-Fitness
  • Science-Technology
  • Contact US
  • Toggle search form
routersploit-hacking

Routersploit | Penetration Testing Tool for Exploiting routers

Posted on May 23, 2021May 25, 2021 By menofletter No Comments on Routersploit | Penetration Testing Tool for Exploiting routers

Routersploit framework is an open-source framework that is used to exploit embedded devices, especially for routers. This framework is similar to the Metasploit framework and the tool can be installed to Kali Linux.

Disclaimer: All data and information provided in this article are for informational purposes only. We will not be responsible for any action performed by any reader.

 

Installation

Download the repo from GitHub using the following command

git clone https://github.com/threat9/routersploit

Change the directory

cd routersploit

Install pip (if not installed earlier)

apt-get install pyhon3-pip

Install the requirements file

python3 -m pip install -r requirements.txt

after the above setup, you can run routersploit using the following command

python3 rsf.py

Modules available in routerspolit

  • exploits: Module that contacts all the identified vulnerabilities
  • creds: Module to test for login credentials with predefined usernames and passwords
  • scanners: Module that runs the scanning with the preconfigured list of vulnerabilities
  • payloads: Module to generate payloads according to the device type
  • generic/encoders: Module that includes the generic payloads and encoders

The above modules contain different options that can use. To view the available options, use the following command

search <module name>

This will show all the options available under that particular module.

How to use Routersploit

When you have your target, first you have to choose the module and options using the following command

use <module name>/>options>

Example: use scanner/autopwn

Then you have to look into the available options in that particular module/options by the command:

show options

This will show the available options and there you can set the target and other values using the 'set' command. Once you finish, Use the 'run' command to start to exploit

 

Want to become an Ethical Hacker...??? Buy our complete guide on Ethical Hacking

Hacking and Penetration Testing: Learn Ethical Hacking from Scratch

Hacking and Penetration Testing: Learn Ethical Hacking from Scratch

menofletter

See author's posts

Science-Technology Tags:Ethical Hacking, Hacking

Post navigation

Previous Post: Osintgram – An OSINT Tool on Instagram
Next Post: Crystals : All you want to know

Related Posts

sherlock-python-hacking Hunt Down Social Media Accounts by username with Sherlock Science-Technology
virtual-box-guide How to install VirtualBox on Windows 10 || Complete Guide Science-Technology
google-hacking-google-dorking Google Dorking | Use Google as a Hacking Tool Science-Technology
OSINT-Osintgram-Hack-instagram Osintgram – An OSINT Tool on Instagram Science-Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • Yoga: Origin, History, and different paths of Yoga
  • How to Setup Your Own VPN Server for Free
  • Astral Projection | Out-Of-Body-Experience: All you want to know
  • Non-Fungible Tokens (NFT) explained | How to make money using NFT
  • Omens and Beliefs

Copyright © 2022 Men Of Letters

Powered by PressBook Media WordPress theme