lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <88001FC5C453764CA6597FB298742494026DD92D@SVEX03.dutchtone.nl>
From: allan.vanleeuwen at orangemail.nl (Leeuwen, Allan van)
Subject: previledge password in cisco routers

And may I add that your other posts look more or less the same ....
I'm putting my money on you being a skiddie :)

l8r 

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Michael
Rutledge
Sent: Wednesday, November 24, 2004 2:42 PM
To: full-disclosure@...ts.netsys.com
Cc: john morris
Subject: Re: [Full-Disclosure] previledge password in cisco routers

The amount of help you receive on this mailing list is going to depend
greatly on one question:  Do you own the box?  (or the router as it is
in your case).  As it stands, and I mean this in the best way possible,
you look like a script kiddie looking to get some leetness by doing
something easy.  The suggestions you get on FD are not going to be as
helpful to you if you are trying to hack someone else's hardware.

That said, I happily look forward to the flames you are about to get for
asking how to hack someone's router. This will be an entertaining
Wednesday after all.  :)

-Michael


On Wed, 24 Nov 2004 04:28:18 -0800 (PST), Paulo Pereira
<pjp@...lo-pereira.net> wrote:
> John,
> 
> if you have an old config you may decode it with some available tools 
> in the web. A google search for "cisco password recovery" may help
you.
> 
> If you use TACACS change it there... or force the TACACS to disappear 
> to use the local one... it really depends on the configs you have in
the box.
> 
> Regards,
> 
> Paulo Pereira
> 
> <quote who="john morris">
> 
> 
> > Ooops.. i reframe my question. Is there a way to get the enable 
> > password remotely . Brute force is not my option
> >
> >
> >
> > (FROM LINKS TO LINKS WE ARE ALL LINKED)
> >
> > cheersssss.....
> >
> > morris
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



===========================================================

De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is alleen bestemd voor de geadresseerde. Indien u dit bericht onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct te informeren door het bericht te retourneren. Hoewel Orange maatregelen heeft genomen om virussen in deze email of attachments te voorkomen, dient u ook zelf na te gaan of virussen aanwezig zijn aangezien Orange niet aansprakelijk is voor computervirussen die veroorzaakt zijn door deze email.

The information contained in this message may be confidential and is intended to be only for the addressee. Should you receive this message unintentionally, please do not use the contents herein and notify the sender immediately by return e-mail. Although Orange has taken steps to ensure that this email and attachments are free from any virus, you do need to verify the possibility of their existence as Orange can take no responsibility for any computer virus which might be transferred by way of this email.

===========================================================


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ