Penetration Testing Network Routers using RouterSploit


In this article we’re going to discuss penetration testing network routers using RouterSploit in a beginner’s way. Basically RouterSploit is a router exploitation framework or we can say penetration testing framework for routers, designed especially for embedded devices.

This framework can perform three main modules:

  1. exploiting module: contains list of all the publicly available exploits.
  2. creds module: help us for testing logins for different devices.
  3. scanners module: enable us for checking a particular exploit against a particular device.

Unfortunately, this tool is not available with the official installation of the Kali Linux OS. RouterSploit installation is very simple just follow these steps

Enter the following command to clone the GitHub repository:

git clone

We go to the directory using the cd routersploit command and run the file as follows:


Results are shown below:

Penetration Testing Network Routers

For launching an exploit against a router, we use following command:

use exploits/routername/exploitname

Here is how command will look like:

Penetration Testing Network Routers

Now you need to check for available options. So, use the show options command.

Now we need to set the target with following command:

set target <Target IP Address>

Here is the output of the preceding command:

Penetration Testing Network Routers

Now we simply type exploit or run:

Penetration Testing Network Routers

In my case router was not vulnerable to that exploit but there are many possibilities for us to find working exploits available publicly.

2Creds Module in RouterSploit for Penetration Testing Network Routers

Now it’s time to learn about creds module of routersploit for penetration testing network routers.

This module used for testing default password combinations on the services via the dictionary attack.

Use the creds command to run the dictionary attack on various services:

use creds/telnet_bruteforce

As we have done twice before look for available options using show options then set target and in the end use run command.

Let me recommend you some other practical guides about penetration testing of Remote Access Protocols, Remote Desktop ProtocolSSH Network Protocol, WordPress website using WPSeku,

Thanks for your support.



Please enter your comment!
Please enter your name here