mkbrutusproject / MKBRUTUS

Password bruteforcer for MikroTik devices or boxes running RouterOS
Other
181 stars 80 forks source link

Timeout #6

Open ldoench opened 8 years ago

ldoench commented 8 years ago

Hey could it be that your tool is not working with Router OS 6.2? Because when i tried this i got :

[*] Starting bruteforce attack...

Traceback (most recent call last): File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 364, in main() File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 330, in main defaultcreds = apiros.login("admin", "") File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 103, in login for repl, attrs in self.talk(["/login"]): File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 116, in talk i = self.readSentence(); File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 140, in readSentence w = self.readWord() File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 149, in readWord ret = self.readStr(self.readLen()) File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 178, in readLen c = ord(self.readStr(1)) File "C:\Users\Leon\Desktop\mkbrutusproject-MKBRUTUS-e1b13ff\mkbrutus.py", line 220, in readStr s = self.sk.recv(length - len(ret)) socket.timeout: timed out

Tried many things to make sure the port is open, i entered the correct ip and have a valid dictionary, but nothing changed. Any ideas?

JackZaitsev commented 8 years ago

Having almost the same problem with my box, its running "RouterOS v6.30.2" but I get the "[Errno -2] Name or service not known" error instead of the timeout, could you share the syntax you used in your tries? and if the DEV could take a look at it for us that would be much appreciated.

rcaire commented 8 years ago

My apollogies for my late reponse. Please paste the entire command that you tried, not only the output.

mecenus commented 7 years ago

python3.5 ./mkbrutus.py -t 192.168.1.1 -d /usr/share/wordlists/metasploit/unix_passwords.txt -u admin routerOs 5.17

AliKarami commented 7 years ago

is this problem still open? nobody found solution?

dustyb commented 7 years ago

same problem here command below

python3 mkbrutus.py -t 192.168.1.1 -p 8291 -d /opt/SecLists/Passwords/500-worst-passwords.txt

Error:

[*] Starting bruteforce attack...
---------------------------------
Traceback (most recent call last):
  File "mkbrutus.py", line 363, in <module>
    main()
  File "mkbrutus.py", line 329, in main
    defaultcreds = apiros.login("admin", "")
  File "mkbrutus.py", line 103, in login
    for repl, attrs in self.talk(["/login"]):
  File "mkbrutus.py", line 116, in talk
    i = self.readSentence();
  File "mkbrutus.py", line 140, in readSentence
    w = self.readWord()
  File "mkbrutus.py", line 149, in readWord
    ret = self.readStr(self.readLen())
  File "mkbrutus.py", line 178, in readLen
    c = ord(self.readStr(1))
  File "mkbrutus.py", line 219, in readStr
    s = self.sk.recv(length - len(ret))
socket.timeout: timed out
rcaire commented 7 years ago

Hi all,

the timeout is because you´re trying to connect to WINBOX port (8291/TCP) and it use a different protocol to make a connection, however, MKBRUTUS was developed to use the API port (8728/TCP by default but can be other). At the time, MKBRUTUS does not support bruteforce connections to WINBOX port.

Cheers Ramiro

On Wed, Aug 30, 2017 at 4:27 PM, droopy notifications@github.com wrote:

same problem here command below

python3 mkbrutus.py -t 192.168.1.1 -p 8291 -d /opt/SecLists/Passwords/500-worst-passwords.txt

Error:

[*] Starting bruteforce attack...

Traceback (most recent call last): File "mkbrutus.py", line 363, in main() File "mkbrutus.py", line 329, in main defaultcreds = apiros.login("admin", "") File "mkbrutus.py", line 103, in login for repl, attrs in self.talk(["/login"]): File "mkbrutus.py", line 116, in talk i = self.readSentence(); File "mkbrutus.py", line 140, in readSentence w = self.readWord() File "mkbrutus.py", line 149, in readWord ret = self.readStr(self.readLen()) File "mkbrutus.py", line 178, in readLen c = ord(self.readStr(1)) File "mkbrutus.py", line 219, in readStr s = self.sk.recv(length - len(ret)) socket.timeout: timed out

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/mkbrutusproject/MKBRUTUS/issues/6#issuecomment-326094119, or mute the thread https://github.com/notifications/unsubscribe-auth/AFVQTbs5lmpuWcJOeavO-MCSJM-LKDulks5sdbe6gaJpZM4H3jhl .

-- Ramiro J. Caire Consultor en Seguridad Informática Ministerio de Seguridad - Gobierno de Santa Fe

Softjelly commented 7 years ago

C:\Users\0\AppData\Local\Programs\Python\Python35-32>python.exe mkbrutus.py -t 1 92.168.1.1 -d 123.txt

[*] Starting bruteforce attack...

[-] SOCKET ERROR! Check Target (IP or PORT parameters). Exiting...

Does anybody know how to solve this?