{"id":5,"date":"2012-05-03T13:42:33","date_gmt":"2012-05-03T13:42:33","guid":{"rendered":"http:\/\/toolbox.pingvinfeszek.hu\/?p=5"},"modified":"2016-12-10T14:17:45","modified_gmt":"2016-12-10T13:17:45","slug":"mikrotik-routeros-password-recovery","status":"publish","type":"post","link":"https:\/\/wp.gaborhargitai.hu\/mikrotik-routeros-password-recovery\/","title":{"rendered":"MikroTik RouterOS Password Recovery"},"content":{"rendered":"
Forgetting a long – usually pwgen generated – password can truly be a pain. There are numerous methods of circumventing the password authentication protection, what we will be dealing with today is extracting the hashed password from a MikroTik backup file.<\/p>\n
First, download the required .deb packages for your Debian\/Ubuntu Linux here:<\/p>\n
mtpass-0.8_i386.deb<\/a><\/p>\n mtpass-o.8_amd64.deb<\/a><\/p>\n Or, alternatively, get the source tarballs (and other platform versions) from here: mtpass homepage<\/a><\/p>\n After the installation has completed (using dpkg -i mtpass-0.8*?.deb<\/b> or anything else you like) just issue the following command:<\/p>\n The end result will look something like this:<\/p>\n.\/mtpass MikroTik-backup-file-name.backup<\/code><\/p>\n
\n
mtpass v0.8 - MikroTik RouterOS password recovery tool, (c) 2008 by manio\r\n\r\nReading file user.dat, 166 bytes long\r\n\r\nRec#| Username | Password | Disable flag | User comment\r\n-------------------------------------------------------\r\n 1 | admin | secretpass || system default user<\/pre>\n<\/blockquote>\n