Quick Start - mrhenrike/MikrotikAPI-BF GitHub Wiki
Quick Start
Language: English · Português (pt-BR)
Get your first result in under 60 seconds.
Step 1 — Clone and Install
git clone https://github.com/mrhenrike/MikrotikAPI-BF.git
cd MikrotikAPI-BF
python -m venv .venv && source .venv/bin/activate # Linux/macOS
python -m venv .venv && .venv\Scripts\activate # Windows
pip install -r requirements.txt
Step 2 — Single Credential Test
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P admin
Step 3 — Wordlist Attack
python mikrotikapi-bf.py -t 192.168.88.1 \
-u examples/usernames.txt \
-p examples/passwords.txt \
--progress
Step 4 — Combo File Attack
python mikrotikapi-bf.py -t 192.168.88.1 -d examples/combos.txt --progress
Step 5 — Export Results
python mikrotikapi-bf.py -t 192.168.88.1 -d examples/combos.txt \
--export-all \
--audit-report \
--progress
Output files: results/mikrotik_*.json, .csv, .xml, .txt, audit_report_*.pdf
Typical Pentest Flow
# 1. Discover Mikrotik devices on subnet
python mikrotikapi-bf.py --discover -n 192.168.1.0/24 --progress
# 2. Fingerprint target
python mikrotikapi-bf.py -t 192.168.88.1 --fingerprint -v
# 3. Stealth wordlist attack
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --stealth --progress
# 4. Post-login service validation
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P found_password \
--validate ftp,ssh,telnet --progress
# 5. Export full audit report
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
--export-all --audit-report
# 6. Run specific exploit (v3.10.0+)
python mikrotikapi-bf.py -t 192.168.88.1 --run-exploit CVE-2018-14847
# 7. Full 8-phase security audit with SARIF (v3.10.0+)
python mikrotikapi-bf.py -t 192.168.88.1 --audit -U admin -P found_password \
--export sarif
See also: Usage Examples · API Reference