kali下routerploit,对IOT设备探测

参考:https://github.com/reverse-shell/routersploit

routerploit部署:

#kali:
git clone https://github.com/reverse-shell/routersploitcd routersploit./rsf.py

#Ubuntu 16.04:
sudo apt-get install python-dev python-pip libncurses5-dev git
git clone https://github.com/reverse-shell/routersploitcd routersploit
pip install -r requirements.txt./rsf.py

#Centos 7:
sudo yum install python-devel python2-pip ncurses-devel git
git clone https://github.com/reverse-shell/routersploit
pip install -r requirements.txt./rsf.py

#OSX:
git clone https://github.com/reverse-shell/routersploitcd routersploitsudo easy_install pipsudo pip install -r requirements.txt./rsf.py

#Docker:
git clone https://github.com/reverse-shell/routersploitcd routersploitdocker build -t routersploit:latest -f Dockerfile ../run_docker.sh

#更新:
cd routersploit
git pull

#使用:
root@kali:~/git/routersploit# ./rsf.py

use exploits/ 不同的设备模块,可以针对不同的设备进行攻击探测。
show options可以看到需要配置的参数
set不同的参数以后
run或者exploit进行攻击探测
show info查看更多的利用信息。
更多完整的内容参考项目页面。

你可能感兴趣的:(kali下routerploit,对IOT设备探测)