| skipped 20 lines |
21 | 21 | | `-i` | The tested Mikrotik IP address | Must |
22 | 22 | | `-p` | The tested Mikrotik SSH port | Must |
23 | 23 | | `-u` | User name with admin Permissions | Must |
24 | | - | `-ps` | The password of the given user name (empty password by defoult) | Optional |
25 | | - | `-J` | Print the results as json format (prints txt format by defoult) | Optional |
| 24 | + | `-ps` | The password of the given user name (empty password by default) | Optional |
| 25 | + | `-J` | Print the results as json format (prints txt format by default) | Optional |
26 | 26 | | |
27 | 27 | | ### Executing examples: |
28 | 28 | | ./main.py -i 1.2.3.4 -p 22 -u admin |
| skipped 3 lines |
32 | 32 | | ### Output: |
33 | 33 | | The output includes 3 sections for each test: |
34 | 34 | | 1. raw data - all the data we search in. |
35 | | - | 2. suspicious - things we found out as suspicious and recommends checking if they are legitimate or malicious. |
36 | | - | 3. recommendation - things we found out as weak security points and recommends to fix. |
| 35 | + | 2. suspicious - things we found out as suspicious and recommend checking if they are legitimate or malicious. |
| 36 | + | 3. recommendation - things we found out as weak security points and recommend to fix. |
37 | 37 | | |
38 | 38 | | |
39 | 39 | | ## Contributing |
| skipped 21 lines |