Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Masscan Integration #852

Open
GH0st3rs opened this issue Nov 17, 2024 · 0 comments
Open

Masscan Integration #852

GH0st3rs opened this issue Nov 17, 2024 · 0 comments

Comments

@GH0st3rs
Copy link
Contributor

GH0st3rs commented Nov 17, 2024

Hi, do you need masscan integration to be able to run selected exploit/vendor to check the ip list?

Probably you will not be able to run it on mobile devices, unless you compile masscan manually for it

./rsf.py
rsf > use scanners/masscan
rsf (Masscan) > set vendor exploits/routers/lg
rsf (Masscan) > set ip_list /tmp/lg.list
rsf (Masscan) > set binary /opt/masscan
rsf (Masscan) > run

[*] Start masscan process
...
[+] Device seams to be vulnerable: 192.168.1.1
  Target          Port   Service   Exploit
  ------           -----  --------   -------
  192.168.1.1 80      http        nas_3718 
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants