Menu

RC-EXPLOITER WIKI

pedro ubuntu


# *RC-EXPLOITER 1.1.6* [[embed url=https://www.youtube.com/watch?v=yEfxWAv6pBs]]

.
.
.



**RC-EXPLOITER 1.1.6 [ resource file service exploiter ]** Author: peterubuntu10@sourceforge.net [ r00t-3xp10it ] Project HomePage: http://sourceforge.net/projects/rcexploiter/ Project WIKIPage: http://sourceforge.net/p/rcexploiter/wiki/RC-EXPLOITER%20WIKI/ ***Dependencies: nmap, metasploit, macchanger, zenity*** . . **[DISCLAMER]** The author does not hold any responsibility about the bad use of this script, remmenber that attacking targets without prior concent its ilegal and punish by law, this script as build to show how msf resource files can automate tasks. ***Learn more about 'resource files' scripting here:*** http://goo.gl/218cxM . . **[DESCRIPTION]** Scanning WAN networks in search of targets may take 10 to 15 minutes depending of your network connection, and will search in 1024 random hosts for the selected port, also the file 'user-names.txt' may be edited to insert new entrys, or we can provide the FULL PATH to another dicionary file to be used in bruteforce services. 'user-names.txt' dicionary as usernames 'one-per-line' (example => root) 'user-passw.txt' dicionary as usernames and passwords (example => root:pass) the tool also have the habillity to exploit multiple targets (RHOSTS) for that just separate the ip address by a blank space (example: 127.0.0.1 192.168.1.68) in the target selection windows (input RHOSTS)... . . **[TOOL SETTINGS]** Additional tool settings can be configurated just by editing the ***settings*** file befor running the tool, settings like: use decoys (scanning WAN network) or spoof mac addr [***change mac addr + ip addr***] among other toolkit default settings. . . **[WORK FLOW]** 1º this script will ask (to attacker) to input the port number to search 2º ask to attacker to select the brute-force dicionary file to be used 3º uses nmap to search in WAN network for targets with the specified port open (or manually input) 4º builds a resource file (msfdb.rc) to port targets found to msf database and config all settings needed 5º start msfconsole and run the correspondent 'exploit.rc' againts all targets set in RHOSTS global variable . . **[FINAL NOTES]** All '***exploits.rc***' will use nmap nse script enginne and msf auxiliary modules to gather info + brute force several targets at the same time, and each discovered matching login and password wil create a shell session (open session) to target machine... . . **[DOWNLOAD/INSTALL -> open terminal and write:]** git clone git://git.code.sf.net/p/rcexploiter/RC-exploiter RC-exploiter cd RC-exploiter && chmod +x *.sh nano settings && sudo ./rc-exploiter.sh . .
![alternate text](https://db.tt/NHLAivJy)
![alternate text](https://db.tt/XEjnvg2c)
. . **[Wall Of Fame]**
[wall of fame](https://sourceforge.net/p/rcexploiter/discussion/general/thread/5c6e3f29/?limit=25#d032 "bug reports - Collaborations - Development")



MongoDB Logo MongoDB