AutoSploit - automated hacking

Lord777

Professional
Messages
2,576
Reaction score
1,547
Points
113
Greetings, dear reader! I present to your attention an automated tool for finding and hacking vulnerable hosts - AutoSploit. This tool uses the Shodan API, through which it searches for vulnerable devices, and then tries to exploit various vulnerabilities using the Metasploit Framework.

How It Works
AutoSploit allows the user to enter their search terms for a specific platform, for example; Apache, IIS, etc., by which the list of hosts will be obtained. After obtaining the list of hosts, Exploit will use these targets by running a number of Metasploit Framework modules on them. Which Metasploit Framework modules will be used is determined by programmatically comparing the module name to the original search query.

Dependencies
  • Python 2.7.x
  • Metasploit Framework
  • Apache2
  • PostgreSQ
  • Shodan

Installation
Download AutoSploit from the GitHub repository.

Bash:
Code:
git clone https://github.com/NullArray/AutoSploit
cd AutoSploit

Install Shodan and Blessings.
Bash:
Code:
pip install shodan blessings

Launch
Bash:
Code:
python autosploit.py

Before a script can run any exploit, it must ensure that the Metasploit Framework and its prerequisites, including PostgreSQL and Apache, are running. Therefore, we agree with the launch of PostgreSQL and Apache.

iaLpkppRYSA.jpg


Then we are asked to enter Shodan API Key.

C-EQ0chpIGs.jpg


Next, we are greeted by five menu items.
  1. Usage - shows informational message
  2. Gather Hosts - gives a list of IP addresses for a search query
  3. View Hosts - list of found IP addresses
  4. Exploit - configuring the Metasploit Framework and launching
  5. Quit - quit

RcapjtrNJ_Q.jpg


Modules
If you want to add other modules to the Metasploit Framework, edit the modules.txt.

Example:
Code:
use exploit/linux/http/netgear_wnr2000_rce;exploit -j;

PS
It is highly discouraged to use your IP address for attacks. Otherwise, you will be held accountable.
 
Top