Apache
, IIS
, etc, upon which a list of candidates will be retrieved.Usage
Clone the repo.
git clone https://github.com/NullArray/AutoSploit.git
After which it can be started from the terminal with python autosploit.py
. After which you can select one of five actions. Please see the option summary below.
+------------------+----------------------------------------------------+
| Option | Summary |
+------------------+----------------------------------------------------+
|1. Usage | Display this informational message. |
|2. Gather Hosts | Query Shodan for a list of platform specific IPs. |
|3. View Hosts | Print gathered IPs/RHOSTS. |
|4. Exploit | Configure MSF and Start exploiting gathered targets|
|5. Quit | Exits AutoSploit. |
+------------------+----------------------------------------------------+
Available Modules
The Metasploit modules available with this tool are selected for RCE. You can find them in the modules.txt
file that is included in this repo. Should you wish to add more or other modules please do so in the following format.
use exploit/linux/http/netgear_wnr2000_rce;exploit -j;
With each new module on it’s own line.
Dependencies
AutoSploit depends on the following Python2.7 modules.
shodan
blessings
Should you find you do not have these installed get them with pip like so.
pip install shodan
pip install blessings
Since the program invokes functionality from the Metasploit Framework you need to have this installed also. Get it from Rapid7 by clicking here.
Note
While this isn’t exactly a Beta release it is an early release nonetheless as such the tool might be subject to changes in the future. If you happen to encounter a bug or would like to contribute to the tool’s improvement please feel free to Open a Ticket or Submit a Pull Request
Thanks.
Add Comment