@@ -43,7 +43,7 @@ It consists of various modules that aids penetration testing operations:
U can use tab key for completion.
## Options
### Options
Display module options:
...
...
@@ -62,7 +62,7 @@ Set options:
rsf (D-LINK DIR-300 & DIR-600 RCE) > set target http://192.168.1.1
[+] {'target': 'http://192.168.1.1'}
## Exploit
### Run module
Exploiting target can be achieved by issuing 'run' or 'exploit' command:
...
...
@@ -77,7 +77,7 @@ It is also possible to check if the target is vulnerable to particular exploit:
rsf (D-LINK DIR-300 & DIR-600 RCE) > check
[+] Target is vulnerable
## Info
### Info
Display information about exploit:
...
...
@@ -102,6 +102,91 @@ Display information about exploit:
- http://www.s3cur1ty.de/home-network-horror-days
- http://www.s3cur1ty.de/m1adv2013-003
## 2. Creds
### Pick module
Modules located under creds/ directory allow running dictionary attacks against various network services.
Following services are currently supported:
- ftp
- ssh
- telnet
- http basic auth
- http form auth
- snmp
Every service has been divided into two modules:
- default (e.g. ssh_default) - this kind of modules use one wordlist with default credentials pairs login:password. Module can be quickly used and in matter of seconds verify if the device uses default credentials.
- bruteforce (e.g. ssh_bruteforce) - this kind of modules perform dictionary attacks against specified account or list of accounts. It takes two parameters login and password. These values can be a single word (e.g. 'admin') or entire list of strings (file:///root/users.txt).