Introduction
Routersploit framework is an open-source framework that is used to exploit embedded devices, especially for routers. This framework is similar to the Metasploit framework and the tool can be installed to Kali Linux.
Disclaimer: All data and information provided in this article are for informational purposes only. We will not be responsible for any action performed by any reader.
Installation
Download the repo from GitHub using the following command
git clone https://github.com/threat9/routersploit
Change the directory
cd routersploit
Install pip (if not installed earlier)
apt-get install pyhon3-pip
Install the requirements file
python3 -m pip install -r requirements.txt
after the above setup, you can run routersploit using the following command
python3 rsf.py
Modules available in routerspolit
- exploits: Module that contacts all the identified vulnerabilities
- creds: Module to test for login credentials with predefined usernames and passwords
- scanners: Module that runs the scanning with the preconfigured list of vulnerabilities
- payloads: Module to generate payloads according to the device type
- generic/encoders: Module that includes the generic payloads and encoders
The above modules contain different options that can use. To view the available options, use the following command
search <module name>
This will show all the options available under that particular module.
How to use Routersploit
When you have your target, first you have to choose the module and options using the following command
use <module name>/>options>
Example: use scanner/autopwn
Then you have to look into the available options in that particular module/options by the command:
show options
This will show the available options and there you can set the target and other values using the \’set\’ command. Once you finish, Use the \’run\’ command to start to exploit
Want to become an Ethical Hacker…??? Buy our complete guide on Ethical Hacking
Hacking and Penetration Testing: Learn Ethical Hacking from Scratch