You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to enter their platform specific search query such as; `Apache`, `IIS`, etc, upon which a list of candidates will be retrieved.
4
-
5
-
After this operation has been completed the 'Exploit' component of the program will go about the business of attempting to exploit these targets by running a series of Metasploit modules against them. Which Metasploit modules will be employed in this manner is determined by programmatically comparing the name of the module to the initial search query. However, I have added functionality to run all available modules against the targets in a 'Hail Mary' type of attack as well.
6
-
7
-
The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured through the dialog that comes up before the 'Exploit' component is started.
3
+
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well.
4
+
The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started
8
5
9
6
**Operational Security Consideration**
10
7
11
8
Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available.
12
9
10
+
The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent.
11
+
13
12
## Usage
14
13
15
14
Clone the repo. Or deploy via Docker. Details for which can be found [here](https://github.com/NullArray/AutoSploit/tree/master/Docker) Special thanks to [Khast3x](https://github.com/khast3x) for their contribution in this regard.
After which it can be started from the terminal with `python autosploit.py`. After which you can select one of five actions. Please see the option summary below.
18
+
Starting the program with `python autosploit.py` will open an AutoSploit terminal session. The options for which are as follows.
Choosing option `2` will prompt you for a platform specific search query. Enter `IIS` or `Apache` in example and choose a search engine. After doing so the collected hosts will be saved to be used in the `Exploit` component.
34
31
35
-
The Metasploit modules available with this tool are selected for RCE. You can find them in the `modules.txt` file that is included in this repo. Should you wish to add more or other modules please do so in the following format.
32
+
As of version 2.0 AutoSploit can be started with a number of command line arguments/flags as well. Type `python autosploit.py -h`
33
+
to display all the options available to you. I've posted the options below as well for reference.
36
34
37
35
```
38
-
use exploit/linux/http/netgear_wnr2000_rce;exploit -j;
set the configuration for MSF (IE -C default 127.0.0.1
71
+
8080)
72
+
-e, --exploit start exploiting the already gathered hosts
73
+
74
+
misc arguments:
75
+
arguments that don't fit anywhere else
76
+
77
+
--ruby-exec if you need to run the Ruby executable with MSF use
78
+
this
79
+
--msf-path MSF-PATH pass the path to your framework if it is not in your
80
+
ENV PATH
39
81
```
40
82
41
-
With each new module on it's own line.
42
83
43
84
## Dependencies
44
85
@@ -65,6 +106,8 @@ Since the program invokes functionality from the Metasploit Framework you need t
65
106
66
107
### Note
67
108
68
-
While this isn't exactly a Beta release it is an early release nonetheless as such the tool might be subject to changes in the future. If you happen to encounter a bug or would like to contribute to the tool's improvement please feel free to [Open a Ticket](https://github.com/NullArray/AutoSploit/issues) or [Submit a Pull Request](https://github.com/NullArray/AutoSploit/pulls)
109
+
If you happen to encounter a bug please feel free to [Open a Ticket](https://github.com/NullArray/AutoSploit/issues).
110
+
111
+
If you wish to contribute to the development of this project please be sure to read [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md) before you get started as it contains our contribution guidelines.
0 commit comments