In the previous section, we learned how Metasploit can be effectively used for exploiting remote services. The targets were mainly Windows and Linux operating systems. The number of internet-connected devices is rapidly increasing. These devices have embedded firmware which are also prone to attacks.
RouterSploit is a command-line tool which can be used for exploiting embedded devices. However, it isn't part of the default Kali Linux installation. We can install RouterSploit using the command apt-get install routersploit. Once installed it can be launched from the Terminal by typing in routersploit as shown in the following image:
RouterSploit has an interface very similar to that of the Metasploit console. We can quickly scan the target device using the scanners/autopwn option as shown in the following image. We simply set the...