The Mikrotik version matters?Hello Everyone,
We are facing a serious bug , there is big bug in the microtik system that will destroy it, which will stop our business, and SOLUTIONS must be found, hoping the R&D fix it immediately, and anyone has any idea how to solve it please contact me. Meanwhile, Anyone who wants the username and password of his Mikrotik System , only send me your cloud ip or host name and i will give you it , no matter how long and complicated it is
Go for it:Anyone who wants the username and password of his Mikrotik System , only send me your cloud ip or host name and i will give you it , no matter how long and complicated it is
username : adminGo for it:Anyone who wants the username and password of his Mikrotik System , only send me your cloud ip or host name and i will give you it , no matter how long and complicated it is
demo.mt.lv
demo2.mt.lv
change your user name and password for admin user and he will know itGood, but now try for real with two existing real admin accounts.
Hi SobThose routers have two admin accounts with full rights, and it's even easier, because you can see their names using the password-less "admin" account. It's two MikroTik's own demo routers, with supposedly secure RouterOS. And to be honest, I'm a little skeptic that you can get in (as full admin). But if you really can, keep the paswords for yourself, and if you want to impress us (and MikroTik too, no doubt), just make some small harmless change, e.g. /system note set note="some text".
i did that and i hope them replay as soon as they canPlease contact us at support@mikrotik.com with descriptions
at last open one port !!116.15.139.78 mikrotik with public IP
ya seems like this but using port 80Probably related to this (known) topic: viewtopic.php?t=133533
But, if you think you found a new bug, please contact support directly with instructions and supout.
opean port www and winbox 8291 sirpublic ip 80.249.83.171
Starting Nmap ( https://nmap.org ) at 2018-06-09 04:16 UTCopean port www and winbox 8291 sirpublic ip 80.249.83.171
its all close from my side sirStarting Nmap ( https://nmap.org ) at 2018-06-09 04:16 UTCopean port www and winbox 8291 sirpublic ip 80.249.83.171
NSE: Loaded 40 scripts for scanning.
Initiating Ping Scan at 04:16
Scanning 80.249.83.171 [4 ports]
Completed Ping Scan at 04:16, 0.22s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 04:16
Scanning mail.itbel.com (80.249.83.171) [6 ports]
Discovered open port 80/tcp on 80.249.83.171
Discovered open port 8729/tcp on 80.249.83.171
Discovered open port 8728/tcp on 80.249.83.171
Discovered open port 8291/tcp on 80.249.83.171
Completed SYN Stealth Scan at 04:16, 0.22s elapsed (6 total ports)
Initiating Service scan at 04:16
so, that means one of the next variants: 1) there are no program to get login and password; 2) this program exist, but doesn't work with new ROS versions. 3) it works in theory, but basic security rules (nothing extra ordinary) prevent from it.its all close from my side sirStarting Nmap ( https://nmap.org ) at 2018-06-09 04:16 UTCopean port www and winbox 8291 sirpublic ip 80.249.83.171
NSE: Loaded 40 scripts for scanning.
Initiating Ping Scan at 04:16
Scanning 80.249.83.171 [4 ports]
Completed Ping Scan at 04:16, 0.22s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 04:16
Scanning mail.itbel.com (80.249.83.171) [6 ports]
Discovered open port 80/tcp on 80.249.83.171
Discovered open port 8729/tcp on 80.249.83.171
Discovered open port 8728/tcp on 80.249.83.171
Discovered open port 8291/tcp on 80.249.83.171
Completed SYN Stealth Scan at 04:16, 0.22s elapsed (6 total ports)
Initiating Service scan at 04:16
i search for all your rnage and i just give you sampleStarting Nmap ( https://nmap.org ) at 2018-06-09 04:16 UTCopean port www and winbox 8291 sirpublic ip 80.249.83.171
NSE: Loaded 40 scripts for scanning.
Initiating Ping Scan at 04:16
Scanning 80.249.83.171 [4 ports]
Completed Ping Scan at 04:16, 0.22s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 04:16
Scanning mail.itbel.com (80.249.83.171) [6 ports]
Discovered open port 80/tcp on 80.249.83.171
Discovered open port 8729/tcp on 80.249.83.171
Discovered open port 8728/tcp on 80.249.83.171
Discovered open port 8291/tcp on 80.249.83.171
Completed SYN Stealth Scan at 04:16, 0.22s elapsed (6 total ports)
Initiating Service scan at 04:16
no you are wrongso, that means one of the next variants: 1) there are no program to get login and password; 2) this program exist, but doesn't work with new ROS versions. 3) it works in theory, but basic security rules (nothing extra ordinary) prevent from it.its all close from my side sirStarting Nmap ( https://nmap.org ) at 2018-06-09 04:16 UTCopean port www and winbox 8291 sirpublic ip 80.249.83.171
NSE: Loaded 40 scripts for scanning.
Initiating Ping Scan at 04:16
Scanning 80.249.83.171 [4 ports]
Completed Ping Scan at 04:16, 0.22s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 04:16
Scanning mail.itbel.com (80.249.83.171) [6 ports]
Discovered open port 80/tcp on 80.249.83.171
Discovered open port 8729/tcp on 80.249.83.171
Discovered open port 8728/tcp on 80.249.83.171
Discovered open port 8291/tcp on 80.249.83.171
Completed SYN Stealth Scan at 04:16, 0.22s elapsed (6 total ports)
Initiating Service scan at 04:16
yah not work with 6.42.1 you are rightthis are not my routers, so i wouldn't check, but as i see in your post - they have old ROS. In 6.42.1 was fix for vulnerability in winbox
i don't see any problem in mikrotik, it is the problem of admins. It is so, because there is information in changelog, there were posts in mikrotik twitter, facebook with information about vulnerability and it's fix. also there was information in many other resourcesyah not work with 6.42.1 you are rigththis are not my routers, so i wouldn't check, but as i see in your post - they have old ROS. In 6.42.1 was fix for vulnerability in winbox
after my post someone shear this post viewtopic.php?t=133533
and talks about this bug
That's great work from Mikrotik to slove it
but the big problems a lot systems around the world not upgraded and they not know about it and they trust mikrotik system
here the problem
Nope. If you use old system and set up it to connect to the internet via nude ass - just don't wonder if some kiddies hijack your device.That was major screwup on MikroTik's side, and blaming it on "unsecured routers" in changelog wasn't fair either, people usually don't think about fifty-characters passwords as "unsecured". But it's good there isn't another one.
You're right that when you block connections to WinBox port, it's safe. But you can't block everything. What if the vulnerability wasn't in WinBox server, but in SSTP server? They both depend only on strong passwords (SSTP's non-standard option to require client certificate doesn't count, because it's not compatible with regular clients). If I got hacked because of such vulnerability in SSTP, would you tell me that it's my fault for leaving SSTP port open to whole world? But it's the idea of VPNs, to allow users to connect from everywhere. I agree that it doesn't apply to WinBox, but it's exactly the same principle.The vulnerability allowed a special tool to connect to the Winbox port, and request the system user database file.
Then the comment would be different. SSTP is not the same as administration access to your device. There are zero reasons to leave winbox access open to all, especially with default port.What if the vulnerability wasn't in WinBox server, but in SSTP server? They both depend only on strong passwords (SSTP's non-standard option to require client certificate doesn't count, because it's not compatible with regular clients). If I got hacked because of such vulnerability in SSTP, would you tell me that it's my fault for leaving SSTP port open to whole world? But it's the idea of VPNs, to allow users to connect from everywhere. I agree that it doesn't apply to WinBox, but it's exactly the same principle.
Go For It:Hello Everyone,
We are facing a serious bug , there is big bug in the microtik system that will destroy it, which will stop our business, and SOLUTIONS must be found, hoping the R&D fix it immediately, and anyone has any idea how to solve it please contact me. Meanwhile, Anyone who wants the username and password of his Mikrotik System , only send me your cloud ip or host name and i will give you it , no matter how long and complicated it is