![]() The tool is sucessfull only if our mikrotik device have opened required 8728/TCP port. Prerequisities 1) Mikrotik must have enabled the API service Our mikrotik device must of course have opened the 8728/TCP port. The tool is developed in Python 3 and it performs bruteforce attacks (dictionary-based) against RouterOS (ver. One of such tools is MKBRUTUS, which have been developed mainly as a password bruteforcer for MikroTik devices or boxes running RouterOS. ![]() Gaining access back to our device we may use tools used for pen testing (think ethical). Be able to login into an our MikroTIK device we have to memorize or at least remember our password, what could be sometimes (usually after a years of correct work) problem.
0 Comments
Leave a Reply. |