- Saved searches
- Use saved searches to filter your results more quickly
- License
- threat9/routersploit
- Name already in use
- Sign In Required
- Launching GitHub Desktop
- Launching GitHub Desktop
- Launching Xcode
- Launching Visual Studio Code
- Latest commit
- Git stats
- Files
- README.md
- Saved searches
- Use saved searches to filter your results more quickly
- Installation
- Introducing And Install RouterSploit On Kali Linux
- Introducing RouterSploit
- RouterSploit Modules
- How To Install RoutersSploit On Kali Linux
- How to uninstall Routersploit on Kali Linux
- Conclusion
Saved searches
Use saved searches to filter your results more quickly
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.
Exploitation Framework for Embedded Devices
License
threat9/routersploit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Sign In Required
Please sign in to use Codespaces.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching Xcode
If nothing happens, download Xcode and try again.
Launching Visual Studio Code
Your codespace will open once ready.
There was a problem preparing your codespace, please try again.
Latest commit
Git stats
Files
Failed to load latest commit information.
README.md
RouterSploit — Exploitation Framework for Embedded Devices
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.
It consists of various modules that aid penetration testing operations:
- exploits — modules that take advantage of identified vulnerabilities
- creds — modules designed to test credentials against network services
- scanners — modules that check if a target is vulnerable to any exploit
- payloads — modules that are responsible for generating payloads for various architectures and injection points
- generic — modules that perform generic attacks
Installation on Kali Linux
apt-get install python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
Installation on Ubuntu 20.04
sudo apt-get install git python3-pip git clone https://github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py
Bluetooth Low Energy support:
sudo apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
Installation on Ubuntu 18.04 & 17.10
sudo add-apt-repository universe sudo apt-get install git python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install setuptools python3 -m pip install -r requirements.txt python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
git clone https://www.github.com/threat9/routersploit cd routersploit sudo python3 -m pip install -r requirements.txt python3 rsf.py
git clone https://www.github.com/threat9/routersploit cd routersploit docker build -t routersploit . docker run -it --rm routersploit
Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.
To our surprise, people started to fork routersploit not because they were interested in the security of embedded devices but simply because they want to leverage our interactive shell logic and build their tools using similar concept. All these years they must have said: «There must be a better way!» and they were completely right, the better way is called Riposte.
Riposte allows you to easily wrap your application inside a tailored interactive shell. Common chores regarding building REPLs was factored out and being taken care of so you can focus on specific domain logic of your application.
The RouterSploit Framework is under a BSD license. Please see LICENSE for more details.
Saved searches
Use saved searches to filter your results more quickly
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.
Installation
Communication
Clone this wiki locally
Installation on Kali Linux
apt-get install python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
Installation on Ubuntu 18.04 & 17.10
sudo add-apt-repository universe sudo apt-get install git python3-pip git clone https://www.github.com/threat9/routersploit python3 -m pip install -r requirements python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
git clone https://www.github.com/threat9/routersploit cd routersploit sudo python3 -m pip install -r requirements.txt python3 rsf.py
git clone https://www.github.com/threat9/routersploit cd routersploit docker build -t routersploit . docker run -it --rm routersploit
Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.
Introducing And Install RouterSploit On Kali Linux
Similar to Metasploit, the RouterSploit Framework is an open-source exploitation framework to exploit embedded devices. As an administrator, you can use RouterSploit to discover these devices and patch, upgrade, or replace them if necessary. RouterSploit has a good collection of exploits and a fairly convenient organization of work with them in relation to individual routers. As you guess, this software can also be used maliciously. This article presents Introducing And Install RouterSploit On Kali Linux. Visit the available packages of Eldernode to purchase your own Linux VPS with the best price and support.
Introducing RouterSploit
The powerful RouterSploit is under a BSD license and can run on most Android devices and helps you to identify and exploit common vulnerabilities in routers. You can use RouterSploit and evaluate the security of some devices (routers, cameras, etc.) and perform a pen test. RouterSploit supports Linux (Kali, Debian, Ubuntu, CentOS), macOS/Mac OS X, Raspberry Pi, Windows, and unrooted Android phone also. Since RouterSploit is a Python-based application, So, you can easily develop your own modules. As we mentioned, RouterSploit is similar to Metasploit, the RouterSploit is also made up of various modules. Exploits, payloads, scanners, and creds are its modules which are calling “generic” modules too. Generic Modules performs generic actions such as various code improvements.
RouterSploit Modules
RouterSploit comes with various modules for penetration testing:
Exploits are using to exploit vulnerabilities in the router in order to gain access. They take advantage of identified vulnerabilities.
Generating payloads for various architectures and injection points. The actual payload/data. So the code using to infect/rewrite an exploited router.
This module scans the network and/or a device to see whether it is potentially susceptible to an exploit. They also check if the target is vulnerable to any exploit.
The “Creds” or “credentials” module is used to test credentials on the different devices. These are designed to test credentials against network services. With the creds module, you can perform a dictionary attack on various network protocols such as FTP, SSH, Telnet, HTTP Basic, and HTTP Form.
How To Install RoutersSploit On Kali Linux
The following modules should be present in the system as a requirement to install RouterSploit. The modules are future, requests, Paramiko, Pysnmp, and Pycrypto. Also, Bluepy – Bluetooth low energy is an optional requirement.
When you have prepared them, you can use the following command to install Routersploit on Kali Linux:
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
python3 -m pip install -r requirements.txt
Note: You can also run the command below to install RouteSploit and any other packages on which it depends:
sudo apt-get install routersploit
How to uninstall Routersploit on Kali Linux
If you wish to uninstall RouterSploit, use the following command to remove just the Routersploit package itself:
sudo apt-get remove routersploit
Also, you will be able to remove the Routersploit package and any other dependant packages which are no longer needed. So, type:
sudo apt-get remove --auto-remove routersploit
But if you also want to delete your local/config files for Routersploit then this will work due to any reason, you can simply run:
sudo apt-get purge routersploit
Or similarly, like this Routersploit:
sudo apt-get purge --auto-remove routersploit
Important Point: Purged config/data can not restore by reinstalling the package.
Conclusion
RouterSploit is coded in Python. It also provides a command-line interface, Docker support, and Modular Tools. In this article, RouterSploit was introduced to you and you learned How To Install ReouterSploit on Kali Linux. Try to update RouterSploit very regularly because new modules are adding almost daily. Which exploitation framework do you prefer? Let your friends know about your experience in the Eldernode community.
Click on a star to rate it!
Average rating 0 / 5. Vote count: 0
No votes so far! Be the first to rate this post.