Search the Community
Showing results for tags 'router'.
-
RomBuster is a router exploitation tool that allows to disclosure network router admin password. Features Exploits vulnerabilities in most popular routers such as D-Link, Zyxel, TP-Link and Huawei. Optimized to exploit multiple routers at one time from list. Simple CLI and API usage. [hide][Hidden Content]]
-
How to hack a router may not be easy but this tool makes it easy for everyone, even for a beginner. Before you start here are the requirements: 1.Laptop/PC 2.Kali Linux or any other Linux based OS 3.Basic terminal skills Okay so first thing you need to do is clone the GitHub directory. After you’ve cloned it open your terminal and go to the directory you just cloned which is “routersploit” And then you type the follow command: $python3 rsf.py The framework will look like this one above. Now comes the part where you need to select what you want to attack, in this case we’re attacking a router so you’re gonna type: $use scanners/autopwn Right after that you’re gonna have to define your target, so you type this command: $set target 192.168.0.1 (you need to put your target’s IP instead of that) If you don’t know the router’s IP then you can simply scan your network with nmap. Now you need to run the command “run” and it will start checking for vulnerabilities. The red minuses mean that it’s not vulnerable, the green pluses mean that vulnerability found. Now when it finishes scanning it will show you all the vulnerabilities found. If it found any vulnerability then you simply need to type: $use (the exploit name) $set target 192.168.0.1 $set port 80 $run Now you can execute whatever command you want You can watch the video tutorial as well for better understanding. [Hidden Content]
-
LG-ERICSSON LN202-003H HomeHub route remote configuration disclosure exploit. View the full article
-
- 1
-
- lg-ericsson
- ln202-003h
-
(and 5 more)
Tagged with:
-
Buenos Dias, haber si algun conocerdor/a sabe alguna forma de acceder al router para abrir puertos, estoy colgado a un wireless Vodafone este router: F3686V2_VODAFONE_eMTA. Gracias Compañer@s
-
A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions. The vulnerability provides unauthenticated remote access to the router's WAN configuration page i.e. "wan.htm", which leads to disclosure of sensitive user information including but not limited to PPPoE, DNS configuration etc, also allowing to change the configuration settings as well. Metasploit module and NSE scripts are included. View the full article
-
Sagemcom F@st 5260 routers on firmware version 0.4.39 (and possibly others), in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small. View the full article
-
Huawei Router HG532e command execution exploit. View the full article
-
Cradlepoint routers suffer from password disclosure, weak password storage, and privilege escalation vulnerabilities. View the full article
-
- cradlepoint
- router
-
(and 2 more)
Tagged with: