Microsoft creates tool to scan MikroTik routers for TrickBot infections
Posted: Sat Mar 19, 2022 12:32 am
Notning CVE News but new story: https://www.bleepingcomputer.com/news/s ... nfections/
Community discussions
https://forum.mikrotik.com/
C:\Downloads\Mikrotik\routeros-scanner-main>python main.py -h
usage: main.py [-h] -i IP -p PORT -u USERNAME [-ps PASSWORD] [-J]
optional arguments:
-h, --help show this help message and exit
-i IP, --ip IP The tested Mikrotik IP address
-p PORT, --port PORT The tested Mikrotik SSH port
-u USERNAME, --userName USERNAME
User name with admin Permissions
-ps PASSWORD, --password PASSWORD
The password of the given user name
-J Print the results as json format
C:\Downloads\Mikrotik\routeros-scanner-main>python main.py -i 192.168.89.1 -u demo -p 22 -ps ***redacted***
Mikrotik ip address: 192.168.89.1
Traceback (most recent call last):
File "C:\Downloads\Mikrotik\routeros-scanner-main\main.py", line 62, in <module>
main(args)
File "C:\Downloads\Mikrotik\routeros-scanner-main\main.py", line 31, in main
res = command.run_ssh(ssh_client)
File "C:\Downloads\Mikrotik\routeros-scanner-main\commands\dns.py", line 16, in run_ssh
sus_dns, recommendation = self.check_results_ssh(res, enabled)
File "C:\Downloads\Mikrotik\routeros-scanner-main\commands\dns.py", line 27, in check_results_ssh
if int(item['ttl'].partition('s')[0]) > 200000:
ValueError: invalid literal for int() with base 10: '3d15h25m1'
C:\Downloads\Mikrotik\routeros-scanner-main>
File "/usr/local/lib/python3.9/site-packages/paramiko/transport.py", line 1498, in auth_password
raise SSHException("No existing session")
paramiko.ssh_exception.SSHException: No existing session
It likely is intended to work with RouterOS v6.Has anyone had luck getting this to work? When I point it at my lab hEX S running 7.2rc4 it does this: