[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <d43c8d1b04112405422e6ce78@mail.gmail.com>
From: michael4447 at gmail.com (Michael Rutledge)
Subject: previledge password in cisco routers
The amount of help you receive on this mailing list is going to depend
greatly on one question: Do you own the box? (or the router as it is
in your case). As it stands, and I mean this in the best way
possible, you look like a script kiddie looking to get some leetness
by doing something easy. The suggestions you get on FD are not going
to be as helpful to you if you are trying to hack someone else's
hardware.
That said, I happily look forward to the flames you are about to get
for asking how to hack someone's router. This will be an entertaining
Wednesday after all. :)
-Michael
On Wed, 24 Nov 2004 04:28:18 -0800 (PST), Paulo Pereira
<pjp@...lo-pereira.net> wrote:
> John,
>
> if you have an old config you may decode it with some available tools in
> the web. A google search for "cisco password recovery" may help you.
>
> If you use TACACS change it there... or force the TACACS to disappear to
> use the local one... it really depends on the configs you have in the box.
>
> Regards,
>
> Paulo Pereira
>
> <quote who="john morris">
>
>
> > Ooops.. i reframe my question. Is there a way to get the enable
> > password remotely . Brute force is not my option
> >
> >
> >
> > (FROM LINKS TO LINKS WE ARE ALL LINKED)
> >
> > cheersssss.....
> >
> > morris
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists