1) It is suggested to generate bash cursive to perceive inacceptable password login attempts, if a operator attempts to login more than X epochs in a minute, then it should be reflected as RIDING OUT Effort and this justification should be protected to additional avoid any brute power attempt. 1) Do not use avoidance ADMIN account.
Altogether operator id and passwords are kept in MYSQL folder name radius. Executive ids are kept in rm_manager table and all other usual user ids used for operator login are kept in rm_users table.
Method 1# In what way to add additional admin account in RM
A workaround is to complement another executive with management freedoms. Once its extra, login with this new executive ID, and change the MANAGEMENT explanation password from the Executive list.
Login to MySQL, and use subsequent commands
mysql -uroot -pYOUR_MYSQL_PASS
use radius;
INSERT INTO `radius`.`rm_managers` (`managername`, `password`, `firstname`, `lastname`, `phone`, `mobile`, `address`, `city`, `zip`, `country`, `state`, `comment`, `company`, `vatid`, `email`, `balance`, `perm_listusers`, `perm_createusers`, `perm_editusers`, `perm_edituserspriv`, `perm_deleteusers`, `perm_listmanagers`, `perm_createmanagers`, `perm_editmanagers`, `perm_deletemanagers`, `perm_listservices`, `perm_createservices`, `perm_editservices`, `perm_deleteservices`, `perm_listonlineusers`, `perm_listinvoices`, `perm_trafficreport`, `perm_addcredits`, `perm_negbalance`, `perm_listallinvoices`, `perm_showinvtotals`, `perm_logout`, `perm_cardsys`, `perm_editinvoice`, `perm_allusers`, `perm_allowdiscount`, `perm_enwriteoff`, `perm_accessap`, `perm_cts`, `enablemanager`, `lang`) VALUES ('adminx', 'adminx', 'adminx', 'adminx', '', '', '', '', '', '', '', '', '', '', 'aacable@hotmail.com', '1000.00', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', '1', 'English');
UPDATE rm_managers SET password = MD5('12345') WHERE managername = 'adminx'
Done. Now login with following |ID and goto Managers and change your old ADMIN account password
id = adminx
pass = adminx
Method 2# other approaches to opinion old password (only if its simple form of password)
Passwords are kept in encoded format by
means of SHA1 algorithm.
I recycled the subsequent technique to recover the old PIN (without changing
it)
Login to your Linux box using root account and execute following commands
mysql -h localhost -u root -s -pYOURPASSWORD
use radius;
SELECT * FROM `rm_managers`;
It will show you some scattered information of all the admin accounts with there details and Encrypted passwords.
TIP: You can also use PHPMYADMIN to get info via nice GUI, but as I am a creature living in the dark, therefore I like to use black screen to perform my functions
As showed in the image below .

As you can see in above image, First column in Yellow marking are Manager Id’s stored in the DB radius. and second column marked in RED are passwords stored in encrypted format. Select & copy the encrypted password. Now goto http://crackstation.net/ (or there are other websites too that can encode hash encrypted passwords) and paste your password here and click crack hashes. and you will see your password in plain text in result window. :)~
As showed in the image below .

In what way to view Radius Manager USER’s account password
Login to your Linux box using root account and execute following commands.
mysql -h localhost -u root -s -pyour_password
use radius;
select * from radcheck order by UserName;
It wills illustration you all operators ID’s along with PINs in clear text format.
If you want to opinion only exact data, use the following script.
OR use the CURSIVE to opinion all operators password in clear text format
First make script and allocate it perform rights.
touch /etc/rmuserlist.sh
chmod+x /etc/rmuserlist.sh
Now edit rmuserlist.sh
nano /etc/rmuserlist.sh
and paste the following data
#!/bin/bash
# Script Source: http://wiki.mikrotik.com/wiki/Bash_scripts_for_Linux/Mysql/Freeradius/PPPoE
# https://solutionviews.com
LUSERNAME="$1" if [ -z "$LUSERNAME" ]; then NAME=unspecified fi case $NAME in unspecified) MYCMD="mysql -h localhost -u root -s -pYOURPASSWORD -t -e " $MYCMD "use radius; select * from radcheck order by UserName;" $MYCMD "use radius; select * from radreply order by UserName;" ;; *) MYCMD="mysql -h localhost -u root -s -pYOURPASSWORD -e " $MYCMD "use radius; select * from radcheck order by UserName;" |grep $LUSERNAME $MYCMD "use radius; select * from radreply order by UserName;" |grep $LUSERNAME ;; esac
Foundation: http://wiki.mikrotik.com/wiki/Bash_scripts_for_Linux/Mysql/Freeradius/PPPoENote: Make definite to modify the password in above cursive. Save & EXIT. Now to opinion user list, just type
/etc/rmuserlist.sh
It will display you all user list. To view specific user password, simply type its name like
/etc/rmuserlist.sh testing

About Useful instructions to rearrange admin / manager password.
Transformation OLD Admin Password
UPDATE rm_managers SET password = MD5(‘12345’) WHERE managername = ‘admin’;
Sight Exact Executive Operators list with passwords.
To contract User Particulars for definite Manager & stock in a folder called manager_users.txt
#!/bin/bash # https://solutionviews.com #set -x SQLPASS="YOUR MYSQL SQL PASS HERE" TMP="/tmp/manager_users.txt" num=0 cat $TMP | while read users do num=$[$num+1] USR=`echo $users |awk '{print $1}'` PAS=`mysql -sN -u root -s -p$SQLPASS -e "use radius; select * from radcheck where username = '$USR';" | grep Cleartext-Password | awk '{print $5}'` #echo "$PAS" ' echo "$USR / $PAS" #fi done
Done. Now perform the cursive and it will display you the password for explicit managers only.
Alteration Radius user password in MySQL
SET PASSWORD FOR 'conntrack'@'localhost' = PASSWORD('NEWPASSWORD');