Can anyone tell me how to detect mikrotik device architecture(x86,mipsbe,ppc…etc.)?
Hi,
/system resource print
shows you architecture-name
Thank U,I known this way when we logged in.
What I want known is if we can detect remote device architecture when we have no acess auth.
When “IP Neighbor” feature is on (which it is by default) and you are on a link that supports broadcast, you can see it in the table maintained by that feature.
Yes,we can find it on layer2 through MNDP, Can we detect through IP layer(layer3)?
IMHO it SHOULD NOT be able to be check.
Properly configured router should hide such information from WAN side despite if it is L2 or L3 layer.
Why attacker should have possibility to check what kind of device is trying to crack ?
What is the purpose for such information ?
Chimay-red has ability to detect this info,I want know how,Is there some info is leaking but we&mikrotik don’t know.
Chimay Red were using open 8291 and 80 ports. Default configuration on Home AP boards does not allow access to those ports as well as neighbor discovery is disabled on WAN port.
=========================Output of Chimay-red================================
[+] Connecting to: 172.20.100.6:80
[+] Detected RouterOS: 6.27
[+] Detected architecture: mipsbe
[+] 0 seconds until Web server is reset.
[+] Web server reset.
[+] Connecting to target…
[+] Connected.
[+] Sending exploit payload…
[+] Exploit sent.
=========================Output of Chimay-red================================
Are you sure that you are testing WAN interface instead of LAN ? 172.20.100.6 is private address.
zZ, I’m not testing anything,just guessing now. you’re right,172.20.100.6 is private address,Maybe it use MNDP,thanks a lot!
That output is not the result of his own experiment, he copied that from Wikileaks.
I think it was already determined that the router password had to be known or blank for this exploit to be used (not sure).