Skip to main content

Forensics tool for Mikrotik devices.

Project description


RouterOS Scanner

Forensics tool for Mikrotik devices. Search for suspicious properties and weak security points that need to be fixed on the router.

This tool’s functionalities include the following:

  • Get the version of the device and map it to CVEs
  • Check for scheduled tasks
  • Look for traffic redirection rules
  • Look for DNS cache poisoning
  • Look for default ports change
  • Look for non-default users
  • Look for suspicious files
  • Look for proxy, socks and FW rules

Executing and arguments

This tool requires Python 3.8 or later.

Install required Python packages

pip install -r requirements.txt

The arguments:

args Description Must / Optional
-i The tested Mikrotik IP address Must
-p The tested Mikrotik SSH port Optional
-u User name with admin Permissions Must
-ps The password of the given user name (empty password by default) Optional
-J Print the results as json format (prints txt format by default) Optional
-concise Print a shortened text output focusing on recommendations and suspicious data Optional
-update Update the CVE Json file (the file is updated automatically if it hasn't been updated in the last month) Optional

Executing examples:

 ./main.py -i 192.168.88.1 -u admin
 ./main.py -i 192.168.88.1 -p 22 -u admin
 ./main.py -i 192.168.88.1 -p 2000 -u admin -ps 123456
 ./main.py -i 192.168.88.1 -p 2000 -u admin -ps 123456 -J

Output:

The output includes 3 sections for each test:

  1. raw data - all the data we search in.
  2. suspicious - things we found out as suspicious - should be checked if they are legitimate or malicious.
  3. recommendation - things we found out as weak security points and recommendations for fixing them.

More info & solution:

Researchers developed this forensic tool while investigating how MikroTik devices are used in Trickbot C2 infrastructure. You can read more about the research here.

Microsoft Defender for IoT is an agentless network-layer security solution that allows organizations to continuously monitor and discover assets, detect threats, and manage vulnerabilities in their IoT/OT and Industrial Control Systems (ICS) devices, on-premises and in Azure-connected environments.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

routeros_scanner-1.8.tar.gz (41.4 kB view details)

Uploaded Source

Built Distribution

routeros_scanner-1.8-py3-none-any.whl (17.1 kB view details)

Uploaded Python 3

File details

Details for the file routeros_scanner-1.8.tar.gz.

File metadata

  • Download URL: routeros_scanner-1.8.tar.gz
  • Upload date:
  • Size: 41.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.8.8

File hashes

Hashes for routeros_scanner-1.8.tar.gz
Algorithm Hash digest
SHA256 c3c689b9ef59b02728d6fa8e8c9e55a7044ae0150d9bc956eb2b83d1217339b6
MD5 c0bb9a0af4cce009cc85a1b68471e208
BLAKE2b-256 ec9256c9000c1f554be38d2adf899dd1e354ece588478d1e3c701b4a33a25443

See more details on using hashes here.

File details

Details for the file routeros_scanner-1.8-py3-none-any.whl.

File metadata

File hashes

Hashes for routeros_scanner-1.8-py3-none-any.whl
Algorithm Hash digest
SHA256 b0025fe13973b02185e05b153a1c088a2afcd43f160c0e781d2d7a017de1039b
MD5 0c3299efaf6d9f97096f4c07eb681f77
BLAKE2b-256 4baf53da8be3f8f0454ec0780589ce8724ddcb87b3ab86b2e3522538a71eb9fd

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page