If it was public on default ip probably hacked. Did you have it managed in
cnmaestro? If so, it still should be, if not, the serial number is on your
invoice, add it to cnmaestro and you should be able to onboard it then load
a default config, you have to manually create the password fields from a
json file off another unit though

On Tue, Dec 3, 2019, 6:18 PM Darin Steffl <darin.ste...@mnwifi.com> wrote:

> If you believe it was defaulted, it should be admin/admin like you tried.
> It's certainly possible to be hacked within 5 seconds with botnets out
> there scanning. I've talked to guys who've had Mikrotik hacked in minutes
> before they locked it down.
>
> On Tue, Dec 3, 2019, 6:05 PM Nate Burke <n...@blastcomm.com> wrote:
>
>> We had a cable on a tower that had come loose in some strong winds and
>> rubbed through the jacket probably shorting out a bunch of wires inside
>> the cat5 (not actually breaking).  Remarkably, the Ethernet port on the
>> mikrotik was still negotiating 1G, even through there was no RX Traffic
>> from the AP.  When we got the cable fixed, the EPMP AP (1000 series)
>> appears to be at default settings, but I can't log into it.  The Login
>> page comes up, but it returns invalid user/password.  I'm trying
>> admin/admin.  The AP is at it's default name in a Neighbor list, and
>> it's requesting a DHCP Address which is not how it was before the cable
>> problem.  SSH doesn't allow login either.  Tried setting the AP to
>> different IP Addresses via DHCP, and can always get to the HTTP Page,
>> but can't log in.
>>
>> We tried doing the default via power sequence on the tower before
>> replacing it, and that didn't seem to help. (Of course there's no way to
>> see if it actually worked either)  Is there anything I should look at
>> before trying a reset via the reset button on the bench?
>>
>> When we first got the cable replaced, the AP grabbed a public DHCP
>> Address, Could it have been hacked in the 10 minutes it was on that
>> public IP Address?  Are there cambium scanning bots flying around the
>> interwebs.  Or do the SSH Commands for login and changing the password
>> match some other bot scan.
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to