Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
RouterSploit – Router Exploitation Framework (github.com/reverse-shell)
188 points by adamnemecek on April 25, 2016 | hide | past | favorite | 21 comments


This one is not for routers, but every windows admin should be aware if you don't use two factor auth your password hashes can be extracted from memory from every windows computer on your network that you logged into (until reboot).

https://github.com/funkandwagnalls/ranger

"Ranger is a command-line driven attack and penetration testing tool, which has the ability to use an instantiated catapult server to deliver capabilities against Windows Systems. As long as a user has -ONE- set of credentials or a hash set (NTLM, LM, LM:NTLM) he or she can gain access to systems that are apart of the trust.

Using this capability a security professional can extract credentials out of memory in clear-text, access SAM tables, run commands, execute PowerShell scripts, Windows Binaries, and other tools. At this time the tool bypasses the majority of IPS vendor solutions unless they have been custom tuned to detect it. The tool was developed using our home labs in an effort to support security professionals doing legally and/or contractually supported activities."


Thanks for the shout out. This is Dev from the team that just released Ranger at BSides Charm this weekend. Happy to get Chris and Jon involved if anyone has some questions.


I begin by saying promise I read the README :-) but is that something that is run on an attackers machine, or does it rely on running on the target machine itself?

Sorry in advance if that's a silly question.


No worries - Ranger would run on the "attackers" machine. You have to specify the delivery method (wmiexec, psexec, smbexec or atexec) which Ranger utilizes to access the target machine and execute the attack.


I was there. Great tool and presentation!


Thanks! Much appreciated :)


Looks great - exactly like metasploit. Why not just build a module for metasploit?


same question, but indeed looks great


Can anyone tell me why this shouldn't be a set of modules for metasploit? I appreciate the effort put in, the python/ruby argument and that the MIPS_LE shellcode for meterpreter breaks on a lot of boxes, but is there a specific reason why the wheel is being reinvented here instead of putting efforts into extending and improving what's already there?


looks really neat. nothing for my router (Actiontec) unfortunately

also, i had to remove the 'belkin' exploits from the scanner because i kept getting 'connection reset by peer' errors


Don't you mean fortunately? :)


anyone tried it with the new Windows Bash?


Sorry, too busy coding bots.


Incredible


Any good tut's on using this for noobs?


In the least abrasive way possible – If you're a self-described 'noob', I feel like investigating router exploits is going to be more confusing than anything. Embedded devices can be quite different from what you're used to.

With that out of the way – the Usage section of the README is pretty approachable and about as straightforward as router testing gets: https://github.com/reverse-shell/routersploit#usage


Without wanting to encourage script kiddies in any way, but how would a noob go from noob to informed? Genuine question, I promise no snark intended :-)


1) Read documentation and try to understand.

2) Google what you don't understand.

3) Repeat.

Obviously, consuming all sorts of books and general information on the subject you wanna learn about helps, and can complement/substitute Googling.



Nice but I don't see anything for the -WRTs (dd-wrt, openwrt etc.)


watch the vid?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: