Re: Brute Forcing an enable secret
Yes, the program is called John the Ripper. -Original Message- From: Dave <[EMAIL PROTECTED]> To: Cisco Maillist <[EMAIL PROTECTED]> Date: Wednesday, November 15, 2000 1:59 PM Subject: Brute Forcing an enable secret >Hello everyone > > >I know that the type 7 passwords are reversed easily but the enable secret >passwords (type 5) are a MD5 one way hash and cannot be reversed. I have >read that they can be brute forced yet I haven't been able to find any >programs out there that can do this. Does anyone know of any programs that >will take in the MD5 hash of the enable secret and attempt to brute force >it? > >tia > >Dave > >_ >FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html >Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Brute Forcing an enable secret
Did you try l0pht cracker tool? www.l0pht.com -Original Message- From: Dave [mailto:[EMAIL PROTECTED]] Sent: Wednesday, November 15, 2000 1:07 PM To: Cisco Maillist Subject: Brute Forcing an enable secret Hello everyone I know that the type 7 passwords are reversed easily but the enable secret passwords (type 5) are a MD5 one way hash and cannot be reversed. I have read that they can be brute forced yet I haven't been able to find any programs out there that can do this. Does anyone know of any programs that will take in the MD5 hash of the enable secret and attempt to brute force it? tia Dave _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Brute Forcing an enable secret
Title: RE: Brute Forcing an enable secret Any passwording scheme can be brute forced, given enough time, just a like an infinite number of monkeys on an infinite number of typewriters will eventually write all the works of Shakespeare. The idea behind MD5 hashing is that the ONLY hope of cracking it is in brute forcing it, which will take quite a while. Here's a webpage I found on the subject (I just entered "brute force md5" at www.excite.com to find it) that you may find interesting: http://www.stack.nl/~galactus/remailers/attack-3.html (watch the word wrap). - Don -Original Message- From: Dave [mailto:[EMAIL PROTECTED]] Sent: Wednesday, November 15, 2000 10:07 AM To: Cisco Maillist Subject: Brute Forcing an enable secret Hello everyone I know that the type 7 passwords are reversed easily but the enable secret passwords (type 5) are a MD5 one way hash and cannot be reversed. I have read that they can be brute forced yet I haven't been able to find any programs out there that can do this. Does anyone know of any programs that will take in the MD5 hash of the enable secret and attempt to brute force it? tia Dave _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
Brute Forcing an enable secret
Hello everyone I know that the type 7 passwords are reversed easily but the enable secret passwords (type 5) are a MD5 one way hash and cannot be reversed. I have read that they can be brute forced yet I haven't been able to find any programs out there that can do this. Does anyone know of any programs that will take in the MD5 hash of the enable secret and attempt to brute force it? tia Dave _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]