HACKING TOOL|AUTOSPLOIT

Hacking tool Autosploit

HACKING TOOL|AUTOSPLOIT
HACKING TOOL|AUTOSPLOIT

Autosploit

Hacking isn’t always hard. Some lower-tier hackers use programs to automatically steal through breached login details to break into accounts of others, and some penetration testing tools are designed to streamline process so hackers can get in to more interesting stuff as quickly as possible.

Enter AutoSploit, a program which takes that idea of efficient hacking, but severely ramps up the potential for damage by automating nearly everything, including the process of finding a vulnerable target to attack.

“As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts,”  said by a page. Pseudonymous security researcher and AutoSploit creator Vector shared this tool on social media on Wednesday which goes like this,

“This will end in tears”

AutoSploit simply brings together several tools and workflows for hackers into one package. Usually, a hacker might have to find a server or other target ; check the target is vulnerable or not to whatever exploit they may have ; and then deliver the attack successfully.

On the other hand Autosploit, combine Shodan, a sort-of search engine for internet-connected devices.Metasploit, a well-known as penetration testing tool for executing of exploits.

HACKING TOOL|AUTOSPLOIT

“Basically you start the tool, and enter a search query,” told by vector in a Twitter message, referring to the popular web server software. “After that the tool uses the Shodan API to find boxes [computers] that are described as being ‘apache’ on Shodan.”

“After that a list of Metasploit modules is loaded and sorted based on your search query; once the appropriate modules are selected it will start running them in sequence on the list of targets you acquired,” Vector’s added.

Arguably, the tool lowers the barrier of entry to hackers who previously may not have had the skills or tools to target a large number of machines at once. And that has already earned AutoSploit some critics in the information security community.

“There is no need to release this. The tie to Shodan puts it over the edge,”  Richard Bejtlich, a security expert, answered on twitter to Vector’s release.

“There is no legitimate reason to put mass exploitation of public systems within the reach of script kiddies. Just because you can do something doesn’t make it wise to do so. This will end in tears,” Richard added.

On this Vector wasn’t dismayed, though.

“I have seen the comments as well, and I mean, the same critique can be applied to anyone releasing offensive tools as open source,Personally I believe information should be free and I am a fan of open source, so why not?” the Vector’s added.

6 Comments

Add a Comment

Your email address will not be published. Required fields are marked *