Projects STRLCPY routeros-scanner Commits 84afd9ad
🤬
  • edit read me

    edit readme and delete src folder
  • Loading...
  • noafru committed 2 years ago
    84afd9ad
    1 parent f19d8d63
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■
    README.md
    1  -# Project
     1 +# RouterOS Scanner
    2 2   
    3  -> This repo has been populated by an initial template to help get you started. Please
    4  -> make sure to update the content to build a great experience for community-building.
     3 +Forensics tool for Mikrotik devices. Search for suspicious properties and weak security points that need to be fixed on the router.
     4 + 
     5 +This tool’s functionalities include the following:
     6 +- Get the version of the device and map it to CVEs
     7 +- Check for scheduled tasks
     8 +- Look for traffic redirection rules
     9 +- Look for DNS cache poisoning
     10 +- Look for default ports change
     11 +- Look for non-default users
     12 +- Look for suspicious files
     13 +- Look for proxy, socks and FW rules
    5 14   
    6  -As the maintainer of this project, please make a few updates:
     15 +## Executing and arguments
    7 16  
    8  -- Improving this README.MD file to provide a great experience
    9  -- Updating SUPPORT.MD with content about this project's support experience
    10  -- Understanding the security reporting process in SECURITY.MD
    11  -- Remove this section from the README
     17 +### The arguments:
     18 + 
     19 + **args** | **Description** | **Must / Optional**
     20 +----------| ----------------------------------------------------------------| -------------------
     21 +`-i` | The tested Mikrotik IP address | Must
     22 +`-p` | The tested Mikrotik SSH port | Must
     23 +`-u` | User name with admin Permissions | Must
     24 +`-ps` | The password of the given user name (empty password by defoult) | Optional
     25 +`-J` | Print the results as json format (prints txt format by defoult) | Optional
     26 + 
     27 +### executing examples:
     28 + ./main.py -i 1.2.3.4 -p 22 -u admin
     29 + ./main.py -i 1.2.3.4 -p 2000 -u admin -ps 123456
     30 + ./main.py -i 1.2.3.4 -p 2000 -u admin -ps 123456 -J
     31 + 
     32 +### output:
     33 +The output includes 3 sections for each test:
     34 +1. raw data - all the data we search in.
     35 +2. suspicious - things we found out as suspicious and recommends checking if they are legitimate or malicious.
     36 +3. recommendation - things we found out as weak security points and recommends to fix.
     37 + 
    12 38   
    13 39  ## Contributing
    14 40   
    skipped 20 lines
  • src/assets/mikrotik_cpe_match.json assets/mikrotik_cpe_match.json
    Content is identical
  • src/commands/basecommand.py commands/basecommand.py
    Content is identical
  • src/commands/dns.py commands/dns.py
    Content is identical
  • src/commands/files.py commands/files.py
    Content is identical
  • src/commands/fwnat.py commands/fwnat.py
    Content is identical
  • src/commands/fwrules.py commands/fwrules.py
    Content is identical
  • src/commands/ports.py commands/ports.py
    Content is identical
  • src/commands/proxy.py commands/proxy.py
    Content is identical
  • src/commands/scheduler.py commands/scheduler.py
    Content is identical
  • src/commands/socks.py commands/socks.py
    Content is identical
  • src/commands/users.py commands/users.py
    Content is identical
  • src/commands/version.py commands/version.py
    Content is identical
  • ■ ■ ■ ■ ■ ■
    src/main.py main.py
    skipped 50 lines
    51 51   parser = argparse.ArgumentParser()
    52 52   parser.add_argument('-i', '--ip', help='The tested Mikrotik IP address', required=True)
    53 53   parser.add_argument('-p', '--port', help='The tested Mikrotik SSH port', required=True)
    54  - parser.add_argument('-u', '--userName', help='User name of user with admin Permissions', required=True)
    55  - parser.add_argument('-ps', '--password', help='the password of the given user name', default='')
    56  - parser.add_argument('-J', help='print the results as json format', action='store_true')
     54 + parser.add_argument('-u', '--userName', help='User name with admin Permissions', required=True)
     55 + parser.add_argument('-ps', '--password', help='The password of the given user name', default='')
     56 + parser.add_argument('-J', help='Print the results as json format', action='store_true')
    57 57   args = parser.parse_args()
    58 58   
    59 59   main(args)
    skipped 1 lines
  • src/nvd.py nvd.py
    Content is identical
Please wait...
Page is in error, reload to recover