yay autosploit! for making things interesting.
this is a nice addition to the tools i have on my kali instance.
the important thing to do is:
pip install shodan
pip install blessings
if you want to be a script kiddie and hack IoT register with shodan.io and get your api key.
msf modules are not automated, they're predefined here:
$autosploitpwd/modules.txt
as everyone knows, this application scans the shodan.io database of "Internet of Things" and creates a
random list of 6000 IPs to potentially exploit.
you can forego shodan.io's list and create your own targeted list of systems to hijack.
touch $autosploitpwd/hosts.txt
i set up a nc listener per the need for a listening local port
nc -l 123
then calling Multisploit, AutoSploit quickly checks the ports on the hosts on the list (yours or shodan.io's).
you are then presented with the option hijack the host using Metasploit's modules as defined above.
i decided to smash a system that's being retired...
[*] Added workspace: autosploit
LHOST => me
LPORT => 123
VERBOSE => true
THREADS => 100
RHOSTS => sadhost
[-] Exploit failed: The following options failed to validate: RHOST.
[*] Exploit completed, but no session was created.
no joy. but! i will find one...
Thursday, February 1, 2018
autosploit... one more thing to worry about
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment