{"id":4225,"date":"2016-08-02T18:18:50","date_gmt":"2016-08-02T10:18:50","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4225"},"modified":"2016-08-02T18:19:23","modified_gmt":"2016-08-02T10:19:23","slug":"miranda-upnp-interactive-upnp-client","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/08\/miranda-upnp-interactive-upnp-client\/","title":{"rendered":"miranda-upnp – Interactive UPnP Client"},"content":{"rendered":"

Miranda is a Python-based UPnP (Universal Plug-N-Play) client application designed to discover, query and interact with UPNP devices, particularly Internet Gateway Devices (aka, routers). It can be used to audit UPNP-enabled devices on a network for possible vulnerabilities.<\/p>\n

\"miranda-upnp<\/p>\n

Miranda was built on and for a Linux system and has been tested on a Linux 2.6 kernel with Python 2.5. However, since it is written in Python, most functionality should be available for any Python-supported platform. Miranda has been tested against IGDs from various vendors, including Linksys, D-Link, Belkin and ActionTec. All Python modules came installed by default on a Linux Mint 5 (Ubuntu 8.04) test system.<\/p>\n

Features<\/h3>\n

Some of its features include:<\/p>\n