AutoSploit: the tool that anyone can use to hack

This new set of tools goes a step beyond the automation tools that hackers usually have. For example, some tools allow you to test usernames and passwords in various web services from previously hacked accounts. With AutoSploit, the damage can be much greater, since it automates the entire process of searching for vulnerabilities and finding the type of attack necessary to take advantage of them. This tool basically does is unite several hacking tools and different workflows in a single package. For example, instead of the attacker having to manually search for a target and check if it is vulnerable, the tool combines Shodan (the search engine for connected devices) with Metasploit, which allows penetration tests to find possible exploitable vulnerabilities. Finding a vulnerable machine is as easy as opening the program and searching for “apache.” With this, all devices that include apache in their description in Shodan are searched. From there, the Metasploit modules are loaded in an orderly manner. Once the appropriate modules are selected, they start running against the target as needed.

If there were already tools that simplified the process of hacking a computer, with AutoSploit practically anyone without advanced knowledge can try (and probably get) to hack a vulnerable device. It is even possible that they perform automated attacks on a larger group of devices that they otherwise could not have achieved. Its creator turns a deaf ear to criticism and will publish it This has led to many detractors of the tool because it is sure that it will get hacked. For example, a security expert named Richard Bejtlich states that there is no reason to publish the tool. The fact that it has incorporated the search in Shodan makes it out of place. The fact that it is currently possible to create such a tool does not mean that it has to be published and made available to practically any user. Its creator, called Vector, says that such arguments can be applied to virtually any tool that is open source, so it will not desist in its attempt to publish it. All the information is available on its GitHub page. So, what do you think about this new dangerous auto hacking tool? Simply share all your views and thoughts in the comment section below.

Δ

This New Tool Automatically Finds And Hacks Vulnerable Devices - 46This New Tool Automatically Finds And Hacks Vulnerable Devices - 83This New Tool Automatically Finds And Hacks Vulnerable Devices - 63This New Tool Automatically Finds And Hacks Vulnerable Devices - 64