lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <005201c4d237$f757fef0$eb9df718@celeron>
From: dsbryhan at chartermi.net (Scot Bryhan)
Subject: previledge password in cisco routers

maybe the original request should have gone to
cisco-nsp-request@...k.nether.net instead;)
Scot


----- Original Message ----- 
From: "Michael Rutledge" <michael4447@...il.com>
To: <full-disclosure@...ts.netsys.com>
Cc: "john morris" <me.morris@...il.com>
Sent: Wednesday, November 24, 2004 8:42 AM
Subject: Re: [Full-Disclosure] previledge password in cisco routers


> The amount of help you receive on this mailing list is going to depend
> greatly on one question:  Do you own the box?  (or the router as it is
> in your case).  As it stands, and I mean this in the best way
> possible, you look like a script kiddie looking to get some leetness
> by doing something easy.  The suggestions you get on FD are not going
> to be as helpful to you if you are trying to hack someone else's
> hardware.
>
> That said, I happily look forward to the flames you are about to get
> for asking how to hack someone's router. This will be an entertaining
> Wednesday after all.  :)
>
> -Michael
>
>
> On Wed, 24 Nov 2004 04:28:18 -0800 (PST), Paulo Pereira
> <pjp@...lo-pereira.net> wrote:
> > John,
> >
> > if you have an old config you may decode it with some available tools in
> > the web. A google search for "cisco password recovery" may help you.
> >
> > If you use TACACS change it there... or force the TACACS to disappear to
> > use the local one... it really depends on the configs you have in the
box.
> >
> > Regards,
> >
> > Paulo Pereira
> >
> > <quote who="john morris">
> >
> >
> > > Ooops.. i reframe my question. Is there a way to get the enable
> > > password remotely . Brute force is not my option
> > >
> > >
> > >
> > > (FROM LINKS TO LINKS WE ARE ALL LINKED)
> > >
> > > cheersssss.....
> > >
> > > morris
> > >
> > > _______________________________________________
> > > Full-Disclosure - We believe in it.
> > > Charter: http://lists.netsys.com/full-disclosure-charter.html
> > >
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ