Finding a vulnerable machine is as easy as opening the program and searching for “apache.” With this, all devices that include apache in their description in Shodan are searched. From there, the Metasploit modules are loaded in an orderly manner. Once the appropriate modules are selected, they start running against the target as needed.. For example, some tools allow you to test usernames and passwords in various web services from previously hacked accounts. With AutoSploit, the damage can be much greater.
The fact that it is currently possible to create such a tool does not mean that it has to be published and made available to practically any user. Its creator, called Vector, says that such arguments can be applied to virtually any tool that is open source.
practically anyone without advanced knowledge can try (and probably get) to hack a vulnerable device. It is even possible that they perform automated attacks on a larger group of devices that they otherwise could not have achieved.
source- https://techviral.net/new-tool-automatically-hacks-devices/
This post has received gratitude of 2.31 % from @appreciator thanks to: @zahidsun.
You got a 1.13% upvote from @postpromoter courtesy of @zahidsun!
Want to promote your posts too? Check out the Steem Bot Tracker website for more info. If you would like to support the development of @postpromoter and the bot tracker please vote for @yabapmatt for witness!