Menu

RC-EXPLOITER WIKI

pedro ubuntu


RC-EXPLOITER 1.1.6

Video not available




.
.
.

RC-EXPLOITER 1.1.6 [ resource file service exploiter ]
Author: peterubuntu10@sourceforge.net [ r00t-3xp10it ]
Project HomePage: http://sourceforge.net/projects/rcexploiter/
Project WIKIPage: http://sourceforge.net/p/rcexploiter/wiki/RC-EXPLOITER%20WIKI/
Dependencies: nmap, metasploit, macchanger, zenity
.
.
[DISCLAMER]
The author does not hold any responsibility about the bad use of this script,
remmenber that attacking targets without prior concent its ilegal and punish
by law, this script as build to show how msf resource files can automate tasks.
Learn more about 'resource files' scripting here: http://goo.gl/218cxM
.
.
[DESCRIPTION]
Scanning WAN networks in search of targets may take 10 to 15 minutes depending
of your network connection, and will search in 1024 random hosts for the selected
port, also the file 'user-names.txt' may be edited to insert new entrys, or we can
provide the FULL PATH to another dicionary file to be used in bruteforce services.
'user-names.txt' dicionary as usernames 'one-per-line' (example => root)
'user-passw.txt' dicionary as usernames and passwords (example => root:pass)
the tool also have the habillity to exploit multiple targets (RHOSTS) for that
just separate the ip address by a blank space (example: 127.0.0.1 192.168.1.68)
in the target selection windows (input RHOSTS)...
.
.
[TOOL SETTINGS]
Additional tool settings can be configurated just by editing the settings file
befor running the tool, settings like: use decoys (scanning WAN network) or
spoof mac addr change mac addr + ip addr among other toolkit default settings.
.
.
[WORK FLOW]
1º this script will ask (to attacker) to input the port number to search
2º ask to attacker to select the brute-force dicionary file to be used
3º uses nmap to search in WAN network for targets with the specified port open (or manually input)
4º builds a resource file (msfdb.rc) to port targets found to msf database and config all settings needed
5º start msfconsole and run the correspondent 'exploit.rc' againts all targets set in RHOSTS global variable
.
.
[FINAL NOTES]
All 'exploits.rc' will use nmap nse script enginne and msf auxiliary modules to gather info
+ brute force several targets at the same time, and each discovered matching login and password
wil create a shell session (open session) to target machine...
.
.
[DOWNLOAD/INSTALL -> open terminal and write:]
git clone git://git.code.sf.net/p/rcexploiter/RC-exploiter RC-exploiter
cd RC-exploiter && chmod +x .sh
nano settings && sudo ./rc-exploiter.sh
.
.
alternate text

alternate text

.
.
[Wall Of Fame]*
wall of fame