{"id":4225,"date":"2016-08-02T18:18:50","date_gmt":"2016-08-02T10:18:50","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4225"},"modified":"2016-08-02T18:19:23","modified_gmt":"2016-08-02T10:19:23","slug":"miranda-upnp-interactive-upnp-client","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/08\/miranda-upnp-interactive-upnp-client\/","title":{"rendered":"miranda-upnp – Interactive UPnP Client"},"content":{"rendered":"
Miranda is a Python-based UPnP (Universal Plug-N-Play) client application designed to discover, query and interact with UPNP devices, particularly Internet Gateway Devices (aka, routers). It can be used to audit UPNP-enabled devices on a network for possible vulnerabilities.<\/p>\n
<\/p>\n
Miranda was built on and for a Linux system and has been tested on a Linux 2.6 kernel with Python 2.5. However, since it is written in Python, most functionality should be available for any Python-supported platform. Miranda has been tested against IGDs from various vendors, including Linksys, D-Link, Belkin and ActionTec. All Python modules came installed by default on a Linux Mint 5 (Ubuntu 8.04) test system.<\/p>\n
Some of its features include:<\/p>\n
root@kali:~# miranda -h\r\n\r\nCommand line usage: \/usr\/bin\/miranda [OPTIONS]\r\n\r\n -sLoad previous host data from struct file\r\n -l Log user-supplied commands to log file\r\n -i Specify the name of the interface to use (Linux only, requires root)\r\n -u Disable show-uniq-hosts-only option\r\n -d Enable debug mode\r\n -v Enable verbose mode\r\n -h Show help<\/pre>\n You can download miranda-upnp here:<\/p>\n