You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Launching `Autosploit` as a Docker container makes it very easy to use the tool in a hosted cloud environment (AWS, Azure, ...)
31
-
* Separate `postgres` database into individual service for data persistence and potential async updating of the database
32
-
* Create a small bridge network ``haknet`` so the service discovery is automatic
33
-
* Launch `postgres` and `Autosploit` container, both linked by `haknet`
34
-
* Autosploit will automatically launch preconfigured `msfconsole` to the external `postgres` container through `haknet` transparent network
35
-
* Total image size of Kali + Metasploit + Autosploit : 1.75GB
28
+
- Launching `Autosploit` as a Docker container makes it very easy to use the tool in a hosted cloud environment (AWS, Azure, ...)
29
+
- Separate `postgres` database into individual service for data persistence and potential async updating of the database
30
+
- Create a small bridge network `haknet` so the service discovery is automatic
31
+
- Launch `postgres` and `Autosploit` container, both linked by `haknet`
32
+
- Autosploit will automatically launch preconfigured `msfconsole` to the external `postgres` container through `haknet` transparent network
33
+
- Total image size of Kali + Metasploit + Autosploit : 1.75GB
36
34
37
35
## Deploy
38
36
39
-
##### Step 1 - Create bridge network
37
+
### Step 1 - Create bridge network
38
+
40
39
This will enable the Metasploit Framework to talk to the `postgres` database using its hostname, making it abstract.
41
40
42
41
A Tor Socks Proxy can also be added to perform transparent proxy when launching exploits (not for reverse shells though, obviously).
@@ -45,22 +44,23 @@ A Tor Socks Proxy can also be added to perform transparent proxy when launching
45
44
docker network create -d bridge haknet
46
45
```
47
46
48
-
#####Step 2 - Launch services
47
+
### Step 2 - Launch services
49
48
50
49
All automagically linked
51
50
52
-
53
-
###### Step 2.1 - Launch postgres
51
+
#### Step 2.1 - Launch postgres
54
52
55
53
Launch a vanilla `postgres` service, linked to `haknet`
54
+
56
55
```bash
57
56
docker run --network haknet --name msfdb -e POSTGRES_PASSWORD=s3cr3t -d postgres
58
57
```
59
-
###### Step 2.2 - Launch Autosploit
58
+
59
+
#### Step 2.2 - Launch Autosploit
60
60
61
61
Launch `Autosploit`.
62
62
63
-
This Dockerfile will copy the default database config to ```~/.msf4/database.yml```. You can edit the configuration file `database.yml` to your liking before building.
63
+
This Dockerfile will copy the default database config to `~/.msf4/database.yml`. You can edit the configuration file `database.yml` to your liking before building.
64
64
65
65
Please be aware that the first build will take some time (~10mn)
Copy file name to clipboardExpand all lines: README.md
+26-13Lines changed: 26 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# AutoSploit
2
2
3
-
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to enter their platform specific search query such as; `Apache`, `IIS`, etc, upon which a list of candidates will be retrieved.
3
+
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to enter their platform specific search query such as; `Apache`, `IIS`, etc, upon which a list of candidates will be retrieved.
4
4
5
5
After this operation has been completed the 'Exploit' component of the program will go about the business of attempting to exploit these targets by running a series of Metasploit modules against them. Which Metasploit modules will be employed in this manner is determined by programmatically comparing the name of the module to the initial search query. However, I have added functionality to run all available modules against the targets in a 'Hail Mary' type of attack as well.
6
6
@@ -17,41 +17,54 @@ Clone the repo. Or deploy via Docker. Details for which can be found [here](http
After which it can be started from the terminal with `python autosploit.py`. After which you can select one of five actions. Please see the option summary below.
The Metasploit modules available with this tool are selected for RCE. You can find them in the `modules.txt` file that is included in this repo. Should you wish to add more or other modules please do so in the following format.
36
+
33
37
```
34
-
use exploit/linux/http/netgear_wnr2000_rce;exploit -j;
38
+
use exploit/linux/http/netgear_wnr2000_rce;exploit -j;
35
39
```
40
+
36
41
With each new module on it's own line.
37
42
38
43
## Dependencies
44
+
39
45
AutoSploit depends on the following Python2.7 modules.
46
+
40
47
```
41
48
shodan
42
49
blessings
43
50
```
51
+
44
52
Should you find you do not have these installed get them with pip like so.
53
+
54
+
```bash
55
+
pip install shodan blessings
45
56
```
46
-
pip install shodan
47
-
pip install blessings
57
+
58
+
or
59
+
60
+
```bash
61
+
pip install -r requirements.txt
48
62
```
49
-
Since the program invokes functionality from the Metasploit Framework you need to have this installed also.
50
-
Get it from Rapid7 by clicking [here](https://www.rapid7.com/products/metasploit/).
63
+
64
+
Since the program invokes functionality from the Metasploit Framework you need to have this installed also. Get it from Rapid7 by clicking [here](https://www.rapid7.com/products/metasploit/).
51
65
52
66
### Note
67
+
53
68
While this isn't exactly a Beta release it is an early release nonetheless as such the tool might be subject to changes in the future. If you happen to encounter a bug or would like to contribute to the tool's improvement please feel free to [Open a Ticket](https://github.com/NullArray/AutoSploit/issues) or [Submit a Pull Request](https://github.com/NullArray/AutoSploit/pulls)
0 commit comments