Marcin Bury
Marcin Bury
I'm unable to reproduce this behaviour. I don't have access to Technicolor TD5130 model though :/ Since the issue is with FTP and Telnet (which are completely two different implementations)...
It's not possible to uniquely verify exploitation of every vulnerability. By using blind command injection test approach we are going down the road of changing integrity of the device during...
Checks does not pass, please fix it according to what travis says.
Sure @Bouncingbunny , we would love to see your contribution to the project. In case of RAT what do you exactly think of? We are working on "reverse shells" functionality...
@Bouncingbunny Not all routers have python installed. I think your module is quite interesting and it could be something like extension to basic cmd shell. User could run this manually...
Currently for RCE exploits we have custom made command loop: ``` python def command_loop(self): while 1: cmd = raw_input("cmd > ") if cmd in ['exit', 'quit']: return print self.execute(cmd) ```...
@Bouncingbunny Yes you are right, but for now we need to increase identification and exploitation capabilities of the framework to cover more devices. This little hack let you work on...
@bcook-r7 It looks nice. Gonna check it out. Thanks!
Hey @busterb, thanks for that! We are definitely interested in adding Mettle to Routersploit project. I will try to play with it and figure out how it can be incorporated...
You are missing paramiko dependency and it seems that your python environment is messed up. You can try to set it up inside virtualenv.