forked from threat9/routersploit
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Adding multiple tests * Fixing code style
- Loading branch information
Showing
54 changed files
with
649 additions
and
54 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Empty file.
24 changes: 24 additions & 0 deletions
24
routersploit/modules/creds/routers/2wire/ftp_default_creds.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
from routersploit.core.exploit import * | ||
|
||
# hack to import from directory/filename starting with a number | ||
FTPDefault = utils.import_exploit("routersploit.modules.creds.generic.ftp_default") | ||
|
||
|
||
class Exploit(FTPDefault): | ||
__info__ = { | ||
"name": "2Wire Router Default FTP Creds", | ||
"description": "Module performs dictionary attack against 2Wire Router FTP service. " | ||
"If valid credentials are found, they are displayed to the user.", | ||
"authors": ( | ||
"Marcin Bury <marcin[at]threat9.com>", # routersploit module | ||
), | ||
"devices": ( | ||
"2Wire Router", | ||
), | ||
} | ||
|
||
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") | ||
port = OptPort(21, "Target FTP port") | ||
|
||
threads = OptInteger(1, "Number of threads") | ||
defaults = OptWordlist("admin:admin", "User:Pass or file with default credentials (file://)") |
24 changes: 24 additions & 0 deletions
24
routersploit/modules/creds/routers/2wire/ssh_default_creds.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
from routersploit.core.exploit import * | ||
|
||
# hack to import from directory/filename starting with a number | ||
SSHDefault = utils.import_exploit("routersploit.modules.creds.generic.ssh_default") | ||
|
||
|
||
class Exploit(SSHDefault): | ||
__info__ = { | ||
"name": "2Wire Router Default SSH Creds", | ||
"description": "Module performs dictionary attack against 2Wire Router SSH service. " | ||
"If valid credentials are found, they are displayed to the user.", | ||
"authors": ( | ||
"Marcin Bury <marcin[at]threat9.com>", # routersploit module | ||
), | ||
"devices": ( | ||
"2Wire Router", | ||
), | ||
} | ||
|
||
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") | ||
port = OptPort(22, "Target SSH port") | ||
|
||
threads = OptInteger(1, "Number of threads") | ||
defaults = OptWordlist("admin:admin", "User:Pass or file with default credentials (file://)") |
24 changes: 24 additions & 0 deletions
24
routersploit/modules/creds/routers/2wire/telnet_default_creds.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
from routersploit.core.exploit import * | ||
|
||
# hack to import from directory/filename starting with a number | ||
TelnetDefault = utils.import_exploit("routersploit.modules.creds.generic.telnet_default") | ||
|
||
|
||
class Exploit(TelnetDefault): | ||
__info__ = { | ||
"name": "2Wire Router Default Telnet Creds", | ||
"description": "Module performs dictionary attack against Asmax Router Telnet service. " | ||
"If valid credentials are found, they are displayed to the user.", | ||
"authors": ( | ||
"Marcin Bury <marcin[at]threat9.com>", # routersploit module | ||
), | ||
"devices": ( | ||
"2Wire Router", | ||
), | ||
} | ||
|
||
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") | ||
port = OptPort(23, "Target SSH port") | ||
|
||
threads = OptInteger(1, "Number of threads") | ||
defaults = OptWordlist("admin:admin", "User:Pass or file with default credentials (file://)") |
Empty file.
24 changes: 24 additions & 0 deletions
24
routersploit/modules/creds/routers/3com/ftp_default_creds.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
from routersploit.core.exploit import * | ||
|
||
# hack to import from directory/filename starting with a number | ||
FTPDefault = utils.import_exploit("routersploit.modules.creds.generic.ftp_default") | ||
|
||
|
||
class Exploit(FTPDefault): | ||
__info__ = { | ||
"name": "3Com Router Default FTP Creds", | ||
"description": "Module performs dictionary attack against 3Com Router FTP service. " | ||
"If valid credentials are found, they are displayed to the user.", | ||
"authors": ( | ||
"Marcin Bury <marcin[at]threat9.com>", # routersploit module | ||
), | ||
"devices": ( | ||
"3Com Router", | ||
), | ||
} | ||
|
||
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") | ||
port = OptPort(21, "Target FTP port") | ||
|
||
threads = OptInteger(1, "Number of threads") | ||
defaults = OptWordlist("admin:admin", "User:Pass or file with default credentials (file://)") |
24 changes: 24 additions & 0 deletions
24
routersploit/modules/creds/routers/3com/ssh_default_creds.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
from routersploit.core.exploit import * | ||
|
||
# hack to import from directory/filename starting with a number | ||
SSHDefault = utils.import_exploit("routersploit.modules.creds.generic.ssh_default") | ||
|
||
|
||
class Exploit(SSHDefault): | ||
__info__ = { | ||
"name": "3Com Router Default SSH Creds", | ||
"description": "Module performs dictionary attack against 3Com Router SSH service. " | ||
"If valid credentials are found, they are displayed to the user.", | ||
"authors": ( | ||
"Marcin Bury <marcin[at]threat9.com>", # routersploit module | ||
), | ||
"devices": ( | ||
"3Com Router", | ||
), | ||
} | ||
|
||
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") | ||
port = OptPort(22, "Target SSH port") | ||
|
||
threads = OptInteger(1, "Number of threads") | ||
defaults = OptWordlist("admin:admin", "User:Pass or file with default credentials (file://)") |
Oops, something went wrong.