If you believe it was defaulted, it should be admin/admin like you tried.
It's certainly possible to be hacked within 5 seconds with botnets out
there scanning. I've talked to guys who've had Mikrotik hacked in minutes
before they locked it down.

On Tue, Dec 3, 2019, 6:05 PM Nate Burke <n...@blastcomm.com> wrote:

> We had a cable on a tower that had come loose in some strong winds and
> rubbed through the jacket probably shorting out a bunch of wires inside
> the cat5 (not actually breaking).  Remarkably, the Ethernet port on the
> mikrotik was still negotiating 1G, even through there was no RX Traffic
> from the AP.  When we got the cable fixed, the EPMP AP (1000 series)
> appears to be at default settings, but I can't log into it.  The Login
> page comes up, but it returns invalid user/password.  I'm trying
> admin/admin.  The AP is at it's default name in a Neighbor list, and
> it's requesting a DHCP Address which is not how it was before the cable
> problem.  SSH doesn't allow login either.  Tried setting the AP to
> different IP Addresses via DHCP, and can always get to the HTTP Page,
> but can't log in.
>
> We tried doing the default via power sequence on the tower before
> replacing it, and that didn't seem to help. (Of course there's no way to
> see if it actually worked either)  Is there anything I should look at
> before trying a reset via the reset button on the bench?
>
> When we first got the cable replaced, the AP grabbed a public DHCP
> Address, Could it have been hacked in the 10 minutes it was on that
> public IP Address?  Are there cambium scanning bots flying around the
> interwebs.  Or do the SSH Commands for login and changing the password
> match some other bot scan.
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to