[ Tool ] ๐Ÿ›ก๏ธ Mass Mikrotik Exploit + Mass Commander ๐Ÿ›ก๏ธ

  • ๐Ÿ’ŒImportant Message to All Fellas๐Ÿ’Œ

    ๐Ÿ’ŒImportant Message to All Fellas : ๐Ÿ’Œ

    โš ๏ธThank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    โ›” Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    ๐Ÿ† Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    โ˜ฃ๏ธ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    ๐ŸŽฏ Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    โค๏ธ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. โค๏ธ

Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

What is affected?

The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.

In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
๊ฐ•๋ ฅํ•œ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜๋ฉด ์‹œ๊ฐ„์„ ๋‚ญ๋น„ํ•˜์ง€ ์•Š๊ณ  ์ผ์ผ์ด ์ˆ˜๋™์œผ๋กœ ๋ชฉํ‘œ๋ฅผ ์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์ด ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜๋ฉด CVE-2018-14847 winbox ์ต์Šคํ”Œ๋กœ์ž‡์— ๋Œ€ํ•ด ๋„คํŠธ์›Œํฌ ํ˜ธ์ŠคํŠธ ๋ฒ”์œ„(CIDR)๋ฅผ ์Šค์บ”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

View attachment 297

๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ pip : python3 -m pip install

์‹คํ–‰ ๋ช…๋ น: python3 mikrotikbeast.py

ํ—ˆ์šฉ๋œ ์ž…๋ ฅ ์˜ˆ ์ดํ›„
- ์˜ˆ์‹œ 1: '192.168.5.0/24'
- ์˜ˆ์‹œ 2: '172.16.0.0/16'


mikrotik์„ ์•…์šฉํ•œ ํ›„ Python ๊ธฐ๋ฐ˜์˜ ์ƒˆ๋กœ์šด ๋„๊ตฌ๋ฅผ ํ†ตํ•ด ๋Œ€๋Ÿ‰ ๋ช…๋ น์„ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค.
๊ทธ๊ฒƒ์€ Python์„ ์‚ฌ์šฉํ•˜์—ฌ ๋Œ€๋Ÿ‰์˜ routerOS ์žฅ์น˜์— ๋ช…๋ น์„ ๋ณด๋‚ด๋Š” GUI ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ์ž…๋‹ˆ๋‹ค.

์ด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์€ ๋ช…๋ น๊ณผ ๋Œ€์ƒ์„ ๊ฐ€์ ธ์™€ ๋ชจ๋“  ๋Œ€์ƒ์— ๋Œ€ํ•ด ๋ช…๋ น์„ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค.
๋Œ€์ƒ์€ ์‰ผํ‘œ๋กœ ๊ตฌ๋ถ„ํ•˜์—ฌ ์ˆ˜๋™์œผ๋กœ ์ž…๋ ฅํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค(์˜ˆ: 172.0.0.1,172.0.0.2,...,).
๋˜๋Š” ํ•œ ์ค„์— ํ•˜๋‚˜์˜ ๋Œ€์ƒ์œผ๋กœ ํ…์ŠคํŠธ ํŒŒ์ผ์—์„œ ๋Œ€์ƒ์„ ๋กœ๋“œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
View attachment 298

View attachment 299
View attachment 300

View attachment 301





drcrypter.ru

*** ์ˆจ๊ฒจ์ง„ ํ…์ŠคํŠธ: ์ธ์šฉํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ***
*** ์ˆจ๊ฒจ์ง„ ํ…์ŠคํŠธ: ์ธ์šฉํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ***

*** ์ˆจ๊ฒจ์ง„ ํ…์ŠคํŠธ: ์ธ์šฉํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ***
 
Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

What is affected?

The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.

In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.

View attachment 297

Library pip : python3 -m pip install

Run Command : python3 mikrotikbeast.py

after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'


after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices

This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298

View attachment 299
View attachment 300

View attachment 301





drcrypter.ru

*** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***

*** Hidden text: cannot be quoted. ***
thx
 
Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

What is affected?

The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.

In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.

View attachment 297

Library pip : python3 -m pip install

Run Command : python3 mikrotikbeast.py

after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'


after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices

This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298

View attachment 299
View attachment 300

View attachment 301





drcrypter.ru

*** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***

*** Hidden text: cannot be quoted. ***
thanks
 
Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

What is affected?

The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.

In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.

View attachment 297

Library pip : python3 -m pip install

Run Command : python3 mikrotikbeast.py

after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'


after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices

This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298

View attachment 299
View attachment 300

View attachment 301





drcrypter.ru

*** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***

*** Hidden text: cannot be quoted. ***
nice
 
Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

What is affected?

The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.

In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.

View attachment 297

Library pip : python3 -m pip install

Run Command : python3 mikrotikbeast.py

after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'


after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices

This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298

View attachment 299
View attachment 300

View attachment 301





drcrypter.ru

*** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***

*** Hidden text: cannot be quoted. ***
nice thank you
 
Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

What is affected?

The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.

In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.

View attachment 297

Library pip : python3 -m pip install

Run Command : python3 mikrotikbeast.py

after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'


after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices

This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298

View attachment 299
View attachment 300

View attachment 301





drcrypter.ru

*** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***

*** Hidden text: cannot be quoted. ***
thank you bro ineeded this
 

Forum statistics

Threads
1,775
Messages
35,463
Members
8,200
Latest member
drack78
Member time online
651d 17h 9m
Reputation(s)
26