Scanner Routerhunter 2.0 - Testing vulnerabilities in devices & routers connected to the Internet.

Scanner Routerhunter 2.0 – Testing vulnerabilities in devices & routers connected to the Internet.

The Routerhunter was designed to run over the Internet looking for defined ips tracks or random in order to automatically exploit the vulnerability DNSChanger on home routers.

Tool used to find vulnerable routers and devices on the Internet and perform tests. Has been tested on Ubuntu 14.04, Kali Linux, Windows;7/Vista/8.1

Tool used to find vulnerable routers and devices on the Internet and perform tests.
Has been tested on Ubuntu 14.04, Kali Linux, Windows;7/Vista/8.1

The script explores four vulnerabilities in routers
+ Shuttle Tech ADSL Modem-Router 915 WM / Unauthenticated Remote DNS Change Exploit
reference: http://www.exploit-db.com/exploits/35995/

+ D-Link DSL-2740R / Unauthenticated Remote DNS Change Exploit
reference: http://www.exploit-db.com/exploits/35917/

+ D-Link DSL-2640B Unauthenticated Remote DNS Change Exploit
reference: http://1337day.com/exploit/23302/

+ D-Link DSL-2780B DLink_1.01.14 – Unauthenticated Remote DNS Change
reference: https://www.exploit-db.com/exploits/37237/

+ D-Link DSL-2730B AU_2.01 – Authentication Bypass DNS Change
reference: https://www.exploit-db.com/exploits/37240/

+ D-Link DSL-526B ADSL2+ AU_2.01 – Unauthenticated Remote DNS Change
reference: https://www.exploit-db.com/exploits/37241/

+ DSLink 260E – Authenticated routers – DNS Changer – Bruteforce reference: https://www.youtube.com/watch?v=tNjy91g2Rak
http://blog.inurl.com.br/2015/03/dslink-260e-defaut-passwords-dns-change_17.html

routerhunter.py Script:

Source : https://github.com/jh00nbr