RC-EXPLOITER RC-exploiter
Brute-forcing WAN/LAN services
Status: Pre-Alpha
Brought to you by:
peterubuntu10
File | Date | Author | Commit |
---|---|---|---|
bin | 2016-11-11 |
![]() |
[d43d5d] Initial commit |
db | 2016-11-11 |
![]() |
[d43d5d] Initial commit |
dicionarys | 2016-11-11 |
![]() |
[d43d5d] Initial commit |
exploits | 2016-11-11 |
![]() |
[e7c95e] STABLE v1.1.7 |
rc-exploiter.sh | 2016-11-11 |
![]() |
[d43d5d] Initial commit |
readme | 2016-11-11 |
![]() |
[d43d5d] Initial commit |
settings | 2016-11-11 |
![]() |
[d43d5d] Initial commit |
--- -- RC-EXPLOITER v1.1.7 [ resource file services exploiter ] -- Author: peterubuntu10@sourceforge.net [ r00t-3xp10it ] -- Project HomePage: http://sourceforge.net/projects/rcexploiter/ -- Project WIKIPage: http://sourceforge.net/p/rcexploiter/wiki/RC-EXPLOITER%20WIKI/ -- -- Dependencies needed: Nmap,Metasploit,Macchanger,Zenity,Xterm -- Operative systems supported: Linux:kali,Ubuntu,Mint (tested) -- -- -- -- [ DISCLAMER ] -- The author does not hold any responsibility about the bad use of this script, -- remmenber that attacking targets without prior concent its ilegal and punish -- by law, this script was build to show how resource files can automate tasks. -- Learn more about 'resource files' ERB scripting here: http://goo.gl/218cxM -- -- -- [ TOOL DESCRIPTION ] -- Scanning WAN networks in search of targets may take 10 to 15 minutes depending -- of your network connection, the tool will search in 1024 random hosts for the -- selected port open, then port hosts found to metasploit database, and run the -- conrrespondent 'exploit.rc' againts all hosts stored into 'RHOSTS' variable. -- All rc files will use nmap nse scripting enginne to gather information and -- msf auxiliarys modules to gather information + brute-force service selected. -- 'Each discovered matching login and password will create one shell session' -- -- By default rc-exploiter uses 'one-per-line' dicionarys to brute-force services -- found or we can provide the full path to another dicionary file to be used, also -- rc-exploiter give us the abillity to exploit multiple targets at once (RHOSTS) -- for that just separate the hosts by a blank space [ eg: 127.0.0.1 192.168.1.68 ] -- -- -- [ TOOL SETTINGS ] -- Additional tool settings can be configurated just by editing the 'settings' file -- before running the tool, settings like: use decoys [ scanning WAN networks ] or -- spoof mac addr [ change mac addr + ip addr ] among other default settings. -- -- -- -- [ DOWNLOAD/INSTALL ] -- git clone git://git.code.sf.net/p/rcexploiter/RC-exploiter RC-exploiter -- cd RC-exploiter && chmod -R +x *.sh && nano settings && ./rc-exploiter.sh ---