Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can't open #10

Open
Batanin opened this issue Mar 2, 2020 · 9 comments
Open

Can't open #10

Batanin opened this issue Mar 2, 2020 · 9 comments

Comments

@Batanin
Copy link

Batanin commented Mar 2, 2020

Hello, there is such a situation.

./ROSbackup.py decrypt -i MikroTik-encrypted.backup -o MikroTik-plaintext.backup -p password

** Decrypt Backup **
Traceback (most recent call last):
File "./ROSbackup.py", line 426, in
main()
File "./ROSbackup.py", line 415, in main
decrypt(args.input, args.output, args.password)
File "./ROSbackup.py", line 219, in decrypt
magic, length = get_header(input_file)
File "./ROSbackup.py", line 23, in get_header
header = struct.unpack('<II', data)
struct.error: unpack requires a bytes object of length 8

@BigNerd95
Copy link
Owner

Can't help without having the encrypted back file you used

@Batanin
Copy link
Author

Batanin commented Mar 2, 2020

MikroTik.zip

@Batanin Batanin closed this as completed Mar 2, 2020
@Batanin Batanin reopened this Mar 2, 2020
@Batanin
Copy link
Author

Batanin commented Mar 3, 2020

???

@BigNerd95
Copy link
Owner

This is a plaintext backup

./ROSbackup.py info -i MikroTik.backup
** Backup Info **
RouterOS Plaintext Backup
Length: 91999 bytes

You dont have to decrypt it
Just extract

./ROSbackup.py unpack -i MikroTik.backup -d asd
** Unpack Backup **
RouterOS Plaintext Backup
Length: 91999 bytes
Extracting backup...
Wrote 102 files pair in: asd

@Batanin
Copy link
Author

Batanin commented Mar 5, 2020

Hello, how can I open a. *dat file
I need to edit the password on admin.
Thanks for the previous answer !!!

@Batanin
Copy link
Author

Batanin commented Mar 5, 2020

./ROSbackup.py bruteforce -i MikroTik-encrypted.backup -w wordlist.txt

** Bruteforce Backup Password **
RouterOS Encrypted Backup
Length: 92035 bytes
Salt (hex): f75ca7667705a3cb46dee1a4b403bc3a9c378d0d1a1afd474e6966493ef8ab82
Magic Check (hex): db620f14
Brute forcing...
Password NOT found

@Batanin
Copy link
Author

Batanin commented Mar 5, 2020

And the password is definitely there

@Batanin
Copy link
Author

Batanin commented Mar 12, 2020

???

@Batanin
Copy link
Author

Batanin commented Mar 15, 2020

Thank you, I have already reset and reconfigured myself.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants