📜 ⬆️ ⬇️

We exploit the vulnerabilities of wi-fi routers from an android device

Habré has written many articles about the vulnerabilities of various routers, about scanning wi-fi networks on Android devices, their growing potential, etc. In this article I would like to describe the service / services that allow you to fully or rather conveniently exploit the vulnerabilities of wi-fi routers from an Android device. Anyway, the main service in question is Routerpwn .

I met this service when using the notorious dSploit program.
In fact, several services have been collected on the Routerpwn website that simplify the exploitation of vulnerabilities and reduce the entire procedure to a single click. This service is also convenient due to the fact that it has a simple Android client that is available on Google Play .

So, we will start the description of opportunities.

Direct exploitation of vulnerabilities

The site lists and generated to apply the vulnerability of wi-fi routers to thirty manufacturers. It goes without saying that the exploits are grouped in blocks according to the manufacturer by models. For clarity, I will bring screenshots directly from Google Phone.
')
Example exploit block



As can be seen in the screenshot, each record of the exploit, in addition to the obvious date of addition and the name, has a link to the source ("+" sign). Clicking on the name of the exploit generates a script or link to exploit the vulnerability. By default, the exploit is usually applied to the address “192.168.1.1”, but you can change the address by clicking on the appropriate item [IP].

An example of the exploit




Of course, there are few exploits (a little over a hundred) and mostly date back to 2005-2012, but let's say so many vulnerabilities are still relevant and one of the exploits for Huawei turned out to be quite workable).

Key generators

The second useful feature is the key generator. Of course, this is not about key selection using brute force, but about generating standard keys using the MAC address of the router or the SSID network. As it turned out, the thing is undoubtedly necessary and convenient. Apparently the developers of the routers decided not to bother with the generation of standard keys and give us an extra reason. The site contains about a dozen generators for different routers, but for some reason only four generators are built in the Android client ... Although, what prevents us from accessing the site via the Google Phone browser and finding the right one)

Key generators




Standard Password Database

The site has a link to the standard password database, which is located at http://www.phenoelit.org/dpl/dpl.html . The base is dated 2007, but it is rather voluminous and informative.

Password Database



Auxiliary services

The Computer Search Engine , a famous search engine SHODAN , which is in principle worthy of a separate article, is given as ancillary services, so I will describe briefly the functionality.
Of all the functionality of a search engine, we are most interested in geo-search by mac-address and, of course, searching through exploit databases .
Unfortunately, a full-fledged SHODAN search engine client is available only for iPhone and iPad, but for Android there is only a very simplified version on Google Play .
SHODAN search engine client screenshots




ps Presentation video RouterPwn

Source: https://habr.com/ru/post/168839/


All Articles