Lord777
Professional
- Messages
- 2,576
- Reaction score
- 1,547
- Points
- 113
Greetings, dear reader! I present to your attention an automated tool for finding and hacking vulnerable hosts - AutoSploit. This tool uses the Shodan API, through which it searches for vulnerable devices, and then tries to exploit various vulnerabilities using the Metasploit Framework.
How It Works
AutoSploit allows the user to enter their search terms for a specific platform, for example; Apache, IIS, etc., by which the list of hosts will be obtained. After obtaining the list of hosts, Exploit will use these targets by running a number of Metasploit Framework modules on them. Which Metasploit Framework modules will be used is determined by programmatically comparing the module name to the original search query.
Dependencies
Installation
Download AutoSploit from the GitHub repository.
Bash:
Install Shodan and Blessings.
Bash:
Launch
Bash:
Before a script can run any exploit, it must ensure that the Metasploit Framework and its prerequisites, including PostgreSQL and Apache, are running. Therefore, we agree with the launch of PostgreSQL and Apache.
Then we are asked to enter Shodan API Key.
Next, we are greeted by five menu items.
Modules
If you want to add other modules to the Metasploit Framework, edit the modules.txt.
Example:
PS
It is highly discouraged to use your IP address for attacks. Otherwise, you will be held accountable.
How It Works
AutoSploit allows the user to enter their search terms for a specific platform, for example; Apache, IIS, etc., by which the list of hosts will be obtained. After obtaining the list of hosts, Exploit will use these targets by running a number of Metasploit Framework modules on them. Which Metasploit Framework modules will be used is determined by programmatically comparing the module name to the original search query.
Dependencies
- Python 2.7.x
- Metasploit Framework
- Apache2
- PostgreSQ
- Shodan
Installation
Download AutoSploit from the GitHub repository.
Bash:
Code:
git clone https://github.com/NullArray/AutoSploit
cd AutoSploit
Install Shodan and Blessings.
Bash:
Code:
pip install shodan blessings
Launch
Bash:
Code:
python autosploit.py
Before a script can run any exploit, it must ensure that the Metasploit Framework and its prerequisites, including PostgreSQL and Apache, are running. Therefore, we agree with the launch of PostgreSQL and Apache.
Then we are asked to enter Shodan API Key.
Next, we are greeted by five menu items.
- Usage - shows informational message
- Gather Hosts - gives a list of IP addresses for a search query
- View Hosts - list of found IP addresses
- Exploit - configuring the Metasploit Framework and launching
- Quit - quit
Modules
If you want to add other modules to the Metasploit Framework, edit the modules.txt.
Example:
Code:
use exploit/linux/http/netgear_wnr2000_rce;exploit -j;
PS
It is highly discouraged to use your IP address for attacks. Otherwise, you will be held accountable.
