Skip to content
Ekultek edited this page May 7, 2019 · 4 revisions

Usage options

Autosploit has multiple usage options, you can pass flags via the terminal or you can run the AutoSploit terminal itself.

Terminal usage

Starting AutoSploit without any flags will drop you into the Autosploit terminal:

sudo python autosploit.py 
Password:
                              _____     _       _____     _     _ _
#--Author : Vector/NullArray |  _  |_ _| |_ ___|   __|___| |___|_| |_
#--Twitter: @Real__Vector    |     | | |  _| . |__   | . | | . | |  _|
#--Type   : Mass Exploiter   |__|__|___|_| |___|_____|  _|_|___|_|_|
#--Version: 3.1.3                                      |_|
##############################################
    
[+] welcome to autosploit, give us a little bit while we configure
[i] checking your running platform
[i] checking for disabled services
[i] checking if there are multiple exploit files
[+] total of 3 exploit files discovered for use, select one:
1. 'default_modules'
2. 'ArnSRUz'
3. 'default_fuzzers'
root@autosploit# 1
[+] attempting to load API keys
[+] Shodan API token loaded from /Users/admin/bin/tools/autosploit/etc/tokens/shodan.key
[+] Censys API token loaded from /Users/admin/bin/tools/autosploit/etc/tokens/censys.key
[-] no arguments have been parsed at run time, dropping into terminal session. to get help type `help` to quit type `exit/quit` to get help on a specific command type `command help`
root@autosploit# 

From here, you can run the help command to be provided a list of possible commands that are integrated into autosploit:

root@autosploit# help

COMMAND:                SUMMARY:
---------               --------
view/show               Show the already gathered hosts
mem[ory]/history        Display the command history
exploit/run/attack      Run the exploits on the already gathered hosts
search/api/gather       Search the API's for hosts
exit/quit               Exit the terminal session
single                  Load a single host into the file
personal/custom         Load a custom host file
tokens/reset            Reset API tokens if needed
external                View loaded external commands
ver[sion]               View the current version of the program
clean/clear             Clean the hosts.txt file of duplicate IP addresses
help/?                  Display this help

root@autosploit# 

You can also pass help <COM> to see the help for a specific command:

root@autosploit# help search

        Explanation:
        -----------
        Load a custom exploit file, this is useful to attack already gathered hosts
        instead of trying to gather them again from the backup host files inside
        of the `.autosploit_home` directory

        Parameters:
        -----------
        :param file_path: the full path to the loadable hosts file

        Examples:
        ---------
        custom/personal /some/path/to/myfile.txt
        
[!] must provide a list of API names after `search` keyword and query (IE search shodan,censys apache2)
root@autosploit# 

There are a few cool features that come complete with autosploit, including history backups, host backups, tab completion, and the ability to run external commands from inside the autosploit terminal.

Command line arguments

Autosploit comes complete with the ability to pass command line arguments to do things on the fly. You can search 3 different IoT search engines, Shodan, Censys, and ZoomEye note: you will need API keys for shodan and censys.

search engines:
  possible search engines to use

  -c, --censys          use censys.io as the search engine to gather hosts
  -z, --zoomeye         use zoomeye.org as the search engine to gather hosts
  -s, --shodan          use shodan.io as the search engine to gather hosts
  -a, --all             search all available search engines to gather hosts

Modifying requests is simple, you are allowed to run behind a proxy of any type matching this regex ((socks\d+)?(http(s)?)?://) and change your user-agent at your discretion:

requests:
  arguments to edit your requests

  --proxy PROTO://IP:PORT
                        run behind a proxy while performing the searches
  --random-agent        use a random HTTP User-Agent header
  -P USER-AGENT, --personal-agent USER-AGENT
                        pass a personal User-Agent to use for HTTP requests
  -q QUERY, --query QUERY
                        pass your search query

To start right off with exploiting all you have to do is pass pass the exploit flags, if you don't have MSF in your path you can pass the flag to provide the full path:

exploits:
  arguments to edit your exploits

  -E PATH, --exploit-file PATH
                        provide a text file to convert into JSON and save for
                        later use
  -C WORKSPACE LHOST LPORT, --config WORKSPACE LHOST LPORT
                        set the configuration for MSF (IE -C default 127.0.0.1
                        8080)
  -e, --exploit         start exploiting the already gathered hosts

misc arguments:
  arguments that don't fit anywhere else

  --ruby-exec           if you need to run the Ruby executable with MSF use
                        this
  --msf-path MSF-PATH   pass the path to your framework if it is not in your
                        ENV PATH
  --whitelist PATH      only exploit hosts listed in the whitelist file
Clone this wiki locally