Similar to Metasploit, the RouterSploit Framework is an open-source exploitation framework to exploit embedded devices. As an administrator, you can use RouterSploit to discover these devices and patch, upgrade, or replace them if necessary. RouterSploit has a good collection of exploits and a fairly convenient organization of work with them in relation to individual routers. As you guess, this software can also be used maliciously. This article presents Introducing And Install RouterSploit On Kali Linux. Visit the available packages of Eldernode to purchase your own Linux VPS with the best price and support.
The powerful RouterSploit is under a BSD license and can run on most Android devices and helps you to identify and exploit common vulnerabilities in routers. You can use RouterSploit and evaluate the security of some devices (routers, cameras, etc.) and perform a pen test. RouterSploit supports Linux (Kali, Debian, Ubuntu, CentOS), macOS/Mac OS X, Raspberry Pi, Windows, and unrooted Android phone also. Since RouterSploit is a Python-based application, So, you can easily develop your own modules. As we mentioned, RouterSploit is similar to Metasploit, the RouterSploit is also made up of various modules. Exploits, payloads, scanners, and creds are its modules which are calling “generic” modules too. Generic Modules performs generic actions such as various code improvements.
RouterSploit comes with various modules for penetration testing:
Exploits are using to exploit vulnerabilities in the router in order to gain access. They take advantage of identified vulnerabilities.
Generating payloads for various architectures and injection points. The actual payload/data. So the code using to infect/rewrite an exploited router.
This module scans the network and/or a device to see whether it is potentially susceptible to an exploit. They also check if the target is vulnerable to any exploit.
The “Creds” or “credentials” module is used to test credentials on the different devices. These are designed to test credentials against network services. With the creds module, you can perform a dictionary attack on various network protocols such as FTP, SSH, Telnet, HTTP Basic, and HTTP Form.
How To Install RoutersSploit On Kali Linux
The following modules should be present in the system as a requirement to install RouterSploit. The modules are future, requests, Paramiko, Pysnmp, and Pycrypto. Also, Bluepy – Bluetooth low energy is an optional requirement.
When you have prepared them, you can use the following command to install Routersploit on Kali Linux:
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
python3 -m pip install -r requirements.txt
Note: You can also run the command below to install RouteSploit and any other packages on which it depends:
sudo apt-get install routersploit
How to uninstall Routersploit on Kali Linux
If you wish to uninstall RouterSploit, use the following command to remove just the Routersploit package itself:
sudo apt-get remove routersploit
Also, you will be able to remove the Routersploit package and any other dependant packages which are no longer needed. So, type:
sudo apt-get remove --auto-remove routersploit
But if you also want to delete your local/config files for Routersploit then this will work due to any reason, you can simply run:
sudo apt-get purge routersploit
Or similarly, like this Routersploit:
sudo apt-get purge --auto-remove routersploit
Important Point: Purged config/data can not restore by reinstalling the package.
RouterSploit is coded in Python. It also provides a command-line interface, Docker support, and Modular Tools. In this article, RouterSploit was introduced to you and you learned How To Install ReouterSploit on Kali Linux. Try to update RouterSploit very regularly because new modules are adding almost daily. Which exploitation framework do you prefer? Let your friends know about your experience in the Eldernode community.