Cisco uses MD5 to encrypt the password so like every other encrypted
password(UNIX, NT, etc)  it is crackable. The trick is getting the encrypted
string from your sh run config.Plug that into a cracker and it will eventual
crack the password by doing the encryption algorithm with a dictionary
attack against the encrypted string. If you have a good long random password
with many mixed characters it will take much longer to crack but nonetheless
will be crackable especially if you have a fast enough CPU.

If you do a search on google you fill find variuos tools. I'd rather not
endorse any specifically but they have worked for me in the past when I
forgot my password.


""John Botha (Mnet)""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi
>
> The enable password is encrypted only if service "password encryption" is
> used. Same with the vty password.
> The enable secret password is encrypted with a hash algorithm even if the
> "service password encryption" is not being used. As far as I can recall,
the
> algorithm is run locally, and as such should not be able to break with
> external programs.
>
> Regards,
>
> John Botha
>
>
>  -----Original Message-----
> From: Kenny Smith [mailto:[EMAIL PROTECTED]]
> Sent: 16 October 2002 09:40
> To: [EMAIL PROTECTED]
> Subject: what program can decrypte secret password? [7:55680]
>
> Hi..  My network tool (solarwind) can only decrypte the 7 series cisco
> password but it can't decrypte the secret password? Do you know any
program
> can decrypte it?
>
> Besides,  do u know we can only issue telnet command on PIX configuration
> mode not exec mode?
>
>
>
>
>
>
>
> _________________________________________________________________
> Internet access plans that fit your lifestyle -- join MSN.
> http://resourcecenter.msn.com/access/plans/default.asp




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=55723&t=55680
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to