I just ran both of the hashes against a 20Mb wordlist using John the Ripper
with no luck. (Looks like you might have to perform some password recovery.)
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40753&t=40505
--
FAQ, list ar
Tom Monte [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 4:48 PM
To: [EMAIL PROTECTED]
Subject: RE: Can anyone break this Cisco 4912G password? [7:40505]
It is possible to break a Cisco IOS password. I had a piece of software on
my Palm Pilot that does it, but I left it home. :( I know
By the way, Solarwinds also sells a commercial (Windows) product that also
handles configs via SNMP: their Cisco config uploader/downloader. They
offer a 30-day demo (crippled, of course) but I liked it enough to buy a
copy:
http://www.solarwinds.net/tools.htm
Message Posted at:
http://www.g
> switch. I don't want to go through the Password Recovery
> Procedure on this production switch. Can you help?
I assume that you don't have SNMP enabled with read/write? That way you'd
only need the community string to reset the password.
Message Posted at:
http://www.groupstudy.com/form/r
k around and see if I can find
something to break them for you.
-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]
I have forgotten the enable lev
DOH! Copied the wrong thangy!
-Original Message-
From: Ole Drews Jensen [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:53 PM
To: Steve Smith; [EMAIL PROTECTED]
Subject: RE: Can anyone break this Cisco 4912G password? [7:40505]
The password you cracked Steve, was the
well after reading up on cisco's site, that switch is not vulnerable...their
list of vulnerable switches are as follows
700 series dialup routers (750, 760, and 770 series) are not affected.
Catalyst 1900, 2800, 2900, 3000, and 5000 series LAN switches are not
affected. However, optional router
4912G password? [7:40505]
its time to go to lunch
who knows the other one.
-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 1:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]
I have forgotten
have you tried the http exploit?
>>> "Patrick Ramsey" 04/04/02 03:44PM >>>
does it run ios? I've never dealt with that make...is http enabled?
-Patrick
>>> "Orlosky, Glenn M" 04/04/02 02:09PM >>>
I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want
does it run ios? I've never dealt with that make...is http enabled?
-Patrick
>>> "Orlosky, Glenn M" 04/04/02 02:09PM >>>
I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can
its time to go to lunch
who knows the other one.
-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 1:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]
I have forgotten the enable level password
Password recovery time mate.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40506&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [E
I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can you help?
Thanks
Glenn
set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70
Messa
13 matches
Mail list logo