Export - mrhenrike/MikrotikAPI-BF GitHub Wiki

Export

Language: English · Português (pt-BR)

Export results to multiple formats for evidence collection and pentest deliverables.


Export Flags

Flag Output
--export-json results/mikrotik_IP_TIMESTAMP.json
--export-csv results/mikrotik_IP_TIMESTAMP.csv
--export-xml results/mikrotik_IP_TIMESTAMP.xml
--export-txt results/mikrotik_IP_TIMESTAMP.txt
--export-all All of the above simultaneously
--export sarif SARIF v2.1.0 for CI/CD integration (v3.10.0+)
--audit-report Professional PDF audit report
--export-dir PATH Custom output directory (default: results/)

Usage

# Export all formats
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-all

# Export to custom directory
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
  --export-all \
  --export-dir /mnt/pentest/client-x/

# With audit report
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
  --export-all \
  --audit-report

JSON Output

{
  "target": "192.168.88.1",
  "scan_date": "2026-03-28T03:00:00Z",
  "duration_seconds": 1823,
  "total_attempts": 50000,
  "successful_credentials": [
    {
      "username": "admin",
      "password": "password123",
      "validated_services": ["api", "ftp", "ssh"],
      "routeros_version": "7.12.1",
      "board_model": "RouterBOARD 450Gx4",
      "serial": "HF507ABCDE12"
    }
  ],
  "fingerprint": {
    "routeros_version": "7.12.1",
    "board": "RouterBOARD 450Gx4",
    "open_ports": [22, 80, 8291, 8728]
  },
  "cves": [
    { "id": "CVE-2023-30799", "cvss": 9.1, "description": "..." }
  ]
}

CSV Output

target,username,password,validated_services,routeros_version,board,serial
192.168.88.1,admin,password123,"api,ftp,ssh",7.12.1,RouterBOARD 450Gx4,HF507ABCDE12

Audit Report

The --audit-report flag generates a professional PDF document including:

  • Executive summary
  • Target information and scan metadata
  • Findings: credentials found, severity, CVSS
  • CVEs applicable to the detected firmware
  • Risk rating
  • Recommendations (password policy, service restrictions, firmware update)
  • Appendix: full attempt log

SARIF Export (v3.10.0+)

SARIF v2.1.0 output integrates directly with:

  • GitHub Code Scanning / Security tab
  • Azure DevOps / Pipelines
  • Any CI/CD system supporting SARIF upload
python mikrotikapi-bf.py -t 192.168.1.1 --audit -U admin -P pass --export sarif

Output: results/mikrotik_IP_TIMESTAMP.sarif.json


See also: Audit Report · Sessions