Routersploit | Penetration Testing Tool for Exploiting routers

routersploit-hacking-men of letters

Introduction

Routersploit framework is an open-source framework that is used to exploit embedded devices, especially for routers. This framework is similar to the Metasploit framework and the tool can be installed to Kali Linux.

Disclaimer: All data and information provided in this article are for informational purposes only. We will not be responsible for any action performed by any reader.

Installation

Download the repo from GitHub using the following command

git clone https://github.com/threat9/routersploit

Change the directory

cd routersploit

Install pip (if not installed earlier)

apt-get install pyhon3-pip

Install the requirements file

python3 -m pip install -r requirements.txt

after the above setup, you can run routersploit using the following command

python3 rsf.py

Modules available in routerspolit

  • exploits: Module that contacts all the identified vulnerabilities
  • creds: Module to test for login credentials with predefined usernames and passwords
  • scanners: Module that runs the scanning with the preconfigured list of vulnerabilities
  • payloads: Module to generate payloads according to the device type
  • generic/encoders: Module that includes the generic payloads and encoders

The above modules contain different options that can use. To view the available options, use the following command

search <module name>

This will show all the options available under that particular module.

How to use Routersploit

When you have your target, first you have to choose the module and options using the following command

use <module name>/>options>

Example: use scanner/autopwn

Then you have to look into the available options in that particular module/options by the command:

show options

This will show the available options and there you can set the target and other values using the \’set\’ command. Once you finish, Use the \’run\’ command to start to exploit

Want to become an Ethical Hacker…??? Buy our complete guide on Ethical Hacking

Hacking and Penetration Testing: Learn Ethical Hacking from Scratch

Leave a Comment

Your email address will not be published. Required fields are marked *