| skipped 19 lines |
20 | 20 | | `pip install -r requirements.txt` |
21 | 21 | | |
22 | 22 | | ### The arguments: |
23 | | - | **args** | **Description** | **Must / Optional** |
24 | | - | ----------| ------------------------------------------------------------------------------| ------------------- |
25 | | - | `-i` | The tested Mikrotik IP address | Must |
26 | | - | `-p` | The tested Mikrotik SSH port | Must |
27 | | - | `-u` | User name with admin Permissions | Must |
28 | | - | `-ps` | The password of the given user name (empty password by default) | Optional |
29 | | - | `-J` | Print the results as json format (prints txt format by default) | Optional |
30 | | - | `-concise`| Print a shortened text output focusing on recommendations and suspicious data | Optional |
| 23 | + | **args** | **Description** | **Must / Optional** |
| 24 | + | -----------| ------------------------------------------------------------------------------| ------------------- |
| 25 | + | `-i` | The tested Mikrotik IP address | Must |
| 26 | + | `-p` | The tested Mikrotik SSH port | Optional |
| 27 | + | `-u` | User name with admin Permissions | Must |
| 28 | + | `-ps` | The password of the given user name (empty password by default) | Optional |
| 29 | + | `-J` | Print the results as json format (prints txt format by default) | Optional |
| 30 | + | `-concise` | Print a shortened text output focusing on recommendations and suspicious data | Optional |
31 | 31 | | |
32 | 32 | | ### Executing examples: |
33 | | - | ./main.py -i 1.2.3.4 -p 22 -u admin |
34 | | - | ./main.py -i 1.2.3.4 -p 2000 -u admin -ps 123456 |
35 | | - | ./main.py -i 1.2.3.4 -p 2000 -u admin -ps 123456 -J |
| 33 | + | ./main.py -i 192.168.88.1 -u admin |
| 34 | + | ./main.py -i 192.168.88.1 -p 22 -u admin |
| 35 | + | ./main.py -i 192.168.88.1 -p 2000 -u admin -ps 123456 |
| 36 | + | ./main.py -i 192.168.88.1 -p 2000 -u admin -ps 123456 -J |
36 | 37 | | |
37 | 38 | | ### Output: |
38 | 39 | | The output includes 3 sections for each test: |
39 | 40 | | 1. raw data - all the data we search in. |
40 | 41 | | 2. suspicious - things we found out as suspicious - should be checked if they are legitimate or malicious. |
41 | 42 | | 3. recommendation - things we found out as weak security points and recommendations for fixing them. |
42 | | - | |
43 | 43 | | |
44 | 44 | | ## Contributing |
45 | 45 | | |
| skipped 20 lines |