diff --git a/modules/exploits/router/asus_rt_series_get_info/command.js b/modules/exploits/router/asus_rt_n12e_get_info/command.js similarity index 100% rename from modules/exploits/router/asus_rt_series_get_info/command.js rename to modules/exploits/router/asus_rt_n12e_get_info/command.js diff --git a/modules/exploits/router/asus_rt_series_get_info/config.yaml b/modules/exploits/router/asus_rt_n12e_get_info/config.yaml similarity index 51% rename from modules/exploits/router/asus_rt_series_get_info/config.yaml rename to modules/exploits/router/asus_rt_n12e_get_info/config.yaml index 21d066610..1a02835b4 100644 --- a/modules/exploits/router/asus_rt_series_get_info/config.yaml +++ b/modules/exploits/router/asus_rt_n12e_get_info/config.yaml @@ -5,11 +5,11 @@ # beef: module: - asus_rt_series_get_info: + asus_rt_n12e_get_info: enable: true category: ["Exploits", "Router"] - name: "Asus RT Series Get Info" - description: "This module retieves information from an Asus RT series router unauthenticated. The information retrieved includes all connected LAN clients (MAC address and LAN IP) and WAN link details (WAN IP address, gateway, DNS server)." + name: "Asus RT-N12E Get Info" + description: "This module retrieves network information from Asus RT-N12E routers, including WAN link details (WAN IP address, gateway, DNS server) and the MAC address and IP address of all connected clients.
Tested on Firmware version 2.0.0.35." authors: ["bcoles"] target: working: ["ALL"] diff --git a/modules/exploits/router/asus_rt_series_get_info/module.rb b/modules/exploits/router/asus_rt_n12e_get_info/module.rb similarity index 88% rename from modules/exploits/router/asus_rt_series_get_info/module.rb rename to modules/exploits/router/asus_rt_n12e_get_info/module.rb index 05cffbaf1..23fe9742b 100644 --- a/modules/exploits/router/asus_rt_series_get_info/module.rb +++ b/modules/exploits/router/asus_rt_n12e_get_info/module.rb @@ -3,11 +3,11 @@ # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # -class Asus_rt_series_get_info < BeEF::Core::Command +class Asus_rt_n12e_get_info < BeEF::Core::Command def self.options return [ - { 'name' => 'target_ip', 'ui_label' => 'Target IP', 'value' => '192.168.1.1' } + { 'name' => 'target_ip', 'ui_label' => 'Target Host', 'value' => 'router.asus.com' } ] end @@ -29,8 +29,8 @@ class Asus_rt_series_get_info < BeEF::Core::Command dns_servers = "#{$6}" if !ip.nil? && BeEF::Filters.is_valid_ip?(ip) - print_debug("Hooked browser found Asus RT series router [ip: #{ip}]") - BeEF::Core::Models::NetworkHost.add(:hooked_browser_id => session_id, :ip => ip, :type => 'Asus Router') + print_debug("Hooked browser found Asus RT-N12E router [ip: #{ip}]") + BeEF::Core::Models::NetworkHost.add(:hooked_browser_id => session_id, :ip => ip, :type => 'Asus RT-N12E Router') BeEF::Core::Models::NetworkService.add(:hooked_browser_id => session_id, :proto => 'http', :ip => ip, :port => 80, :type => 'HTTP Server') end clients.scan(/([\d\.]+,[:\dA-F]{17})/).flatten.each do |client|