Re: Brute Forcing an enable secret

2000-11-15 Thread Raul F. Fernandez

Yes, the program is called John the Ripper.
-Original Message-
From: Dave <[EMAIL PROTECTED]>
To: Cisco Maillist <[EMAIL PROTECTED]>
Date: Wednesday, November 15, 2000 1:59 PM
Subject: Brute Forcing an enable secret


>Hello everyone
>
>
>I know that the type 7 passwords are reversed easily but the enable secret
>passwords (type 5) are a MD5 one way hash and cannot be reversed.  I have
>read that they can be brute forced yet I haven't been able to find any
>programs out there that can do this.  Does anyone know of any programs that
>will take in the MD5 hash of the enable secret and attempt to brute force
>it?
>
>tia
>
>Dave
>
>_
>FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Brute Forcing an enable secret

2000-11-15 Thread White, Shanice

Did you try l0pht cracker tool?  www.l0pht.com

-Original Message-
From: Dave [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, November 15, 2000 1:07 PM
To: Cisco Maillist
Subject: Brute Forcing an enable secret


Hello everyone


I know that the type 7 passwords are reversed easily but the enable secret
passwords (type 5) are a MD5 one way hash and cannot be reversed.  I have
read that they can be brute forced yet I haven't been able to find any
programs out there that can do this.  Does anyone know of any programs that
will take in the MD5 hash of the enable secret and attempt to brute force
it?

tia

Dave

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Brute Forcing an enable secret

2000-11-15 Thread Taylor, Don
Title: RE: Brute Forcing an enable secret





Any passwording scheme can be brute forced, given enough time, just a like an infinite number of monkeys on an infinite number of typewriters will eventually write all the works of Shakespeare. The idea behind MD5 hashing is that the ONLY hope of cracking it is in brute forcing it, which will take quite a while.

Here's a webpage I found on the subject (I just entered "brute force md5" at www.excite.com to find it) that you may find interesting: http://www.stack.nl/~galactus/remailers/attack-3.html (watch the word wrap).

- Don


-Original Message-
From: Dave [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, November 15, 2000 10:07 AM
To: Cisco Maillist
Subject: Brute Forcing an enable secret



Hello everyone



I know that the type 7 passwords are reversed easily but the enable secret
passwords (type 5) are a MD5 one way hash and cannot be reversed.  I have
read that they can be brute forced yet I haven't been able to find any
programs out there that can do this.  Does anyone know of any programs that
will take in the MD5 hash of the enable secret and attempt to brute force
it?


tia


Dave


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]





Brute Forcing an enable secret

2000-11-15 Thread Dave

Hello everyone


I know that the type 7 passwords are reversed easily but the enable secret
passwords (type 5) are a MD5 one way hash and cannot be reversed.  I have
read that they can be brute forced yet I haven't been able to find any
programs out there that can do this.  Does anyone know of any programs that
will take in the MD5 hash of the enable secret and attempt to brute force
it?

tia

Dave

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]