โ ๏ธThank you for being with us over the past year.
To support our community, we're now offering an "Account Upgrade" for purchase.
VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
HERE Our Official Telegram
โ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them
๐ Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.
โฃ๏ธ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%
๐ฏ Our Plan : Make resource downloads on a private host without using another free upload because easy gone
Information Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
What is affected?
The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.
In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
๊ฐ๋ ฅํ ๋๊ตฌ๋ฅผ ์ฌ์ฉํ๋ฉด ์๊ฐ์ ๋ญ๋นํ์ง ์๊ณ ์ผ์ผ์ด ์๋์ผ๋ก ๋ชฉํ๋ฅผ ์ ํ ์ ์์ต๋๋ค.
์ด ๋๊ตฌ๋ฅผ ์ฌ์ฉํ๋ฉด CVE-2018-14847 winbox ์ต์คํ๋ก์์ ๋ํด ๋คํธ์ํฌ ํธ์คํธ ๋ฒ์(CIDR)๋ฅผ ์ค์บํ ์ ์์ต๋๋ค.
View attachment 297
๋ผ์ด๋ธ๋ฌ๋ฆฌ pip : python3 -m pip install
์คํ ๋ช ๋ น: python3 mikrotikbeast.py
ํ์ฉ๋ ์ ๋ ฅ ์ ์ดํ
- ์์ 1: '192.168.5.0/24'
- ์์ 2: '172.16.0.0/16'
mikrotik์ ์ ์ฉํ ํ Python ๊ธฐ๋ฐ์ ์๋ก์ด ๋๊ตฌ๋ฅผ ํตํด ๋๋ ๋ช ๋ น์ ์๋ํฉ๋๋ค.
๊ทธ๊ฒ์ Python์ ์ฌ์ฉํ์ฌ ๋๋์ routerOS ์ฅ์น์ ๋ช ๋ น์ ๋ณด๋ด๋ GUI ์์ฉ ํ๋ก๊ทธ๋จ์ ๋๋ค.
์ด ์ ํ๋ฆฌ์ผ์ด์ ์ ๋ช ๋ น๊ณผ ๋์์ ๊ฐ์ ธ์ ๋ชจ๋ ๋์์ ๋ํด ๋ช ๋ น์ ์คํํฉ๋๋ค.
๋์์ ์ผํ๋ก ๊ตฌ๋ถํ์ฌ ์๋์ผ๋ก ์ ๋ ฅํ ์ ์์ต๋๋ค(์: 172.0.0.1,172.0.0.2,...,).
๋๋ ํ ์ค์ ํ๋์ ๋์์ผ๋ก ํ ์คํธ ํ์ผ์์ ๋์์ ๋ก๋ํ ์ ์์ต๋๋ค.
View attachment 298
View attachment 299
View attachment 300
View attachment 301
drcrypter.ru
*** ์จ๊ฒจ์ง ํ ์คํธ: ์ธ์ฉํ ์ ์์ต๋๋ค. ****** ์จ๊ฒจ์ง ํ ์คํธ: ์ธ์ฉํ ์ ์์ต๋๋ค. ***
*** ์จ๊ฒจ์ง ํ ์คํธ: ์ธ์ฉํ ์ ์์ต๋๋ค. ***
thxInformation Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
What is affected?
The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.
In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.
View attachment 297
Library pip : python3 -m pip install
Run Command : python3 mikrotikbeast.py
after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'
after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices
This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298
View attachment 299
View attachment 300
View attachment 301
drcrypter.ru
*** Hidden text: cannot be quoted. ****** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***
thanksInformation Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
What is affected?
The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.
In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.
View attachment 297
Library pip : python3 -m pip install
Run Command : python3 mikrotikbeast.py
after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'
after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices
This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298
View attachment 299
View attachment 300
View attachment 301
drcrypter.ru
*** Hidden text: cannot be quoted. ****** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***
niceInformation Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
What is affected?
The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.
In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.
View attachment 297
Library pip : python3 -m pip install
Run Command : python3 mikrotikbeast.py
after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'
after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices
This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298
View attachment 299
View attachment 300
View attachment 301
drcrypter.ru
*** Hidden text: cannot be quoted. ****** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***
nice thank youInformation Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
What is affected?
The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.
In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.
View attachment 297
Library pip : python3 -m pip install
Run Command : python3 mikrotikbeast.py
after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'
after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices
This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298
View attachment 299
View attachment 300
View attachment 301
drcrypter.ru
*** Hidden text: cannot be quoted. ****** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***
thank you bro ineeded thisInformation Threads : MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
What is affected?
The bug affects all MikroTik-branded routers and wireless equipment running RouterOS versions below 6.42.7 or 6.40.9 and requires network access to either the ports used by the WinBox management tool or the regular HTTP (S) management interface. It is additionally possible that the MikroTik API (used for automated device management) could be affected. Tenable also disclosed other, less severe vulnerabilities (mostly denial-of-service) affecting the same versions.
In this post tools give you is mass exploit mikrotik cve CVE-2018-14847 in python3 very fast
a powerful tools can help you mass without manual target one by one waste time
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.
View attachment 297
Library pip : python3 -m pip install
Run Command : python3 mikrotikbeast.py
after Accepted input examples
- Example 1: '192.168.5.0/24'
- Example 2: '172.16.0.0/16'
after got exploited mikrotik you try mass command via new tools based python also
that is gui application that uses python to send commands to a mass amount routerOS devices
This application takes commands and targets and runs the command(s) against all the targets.
Targets can either be enter manually, seperated by commas (ex: 172.0.0.1,172.0.0.2,...,),
or targets can be loaded from a text file, with one target per line.
View attachment 298
View attachment 299
View attachment 300
View attachment 301
drcrypter.ru
*** Hidden text: cannot be quoted. ****** Hidden text: cannot be quoted. ***
*** Hidden text: cannot be quoted. ***