lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <C246F099C408FE429BCEE7473E2DDC604297EC@internet1.mccd.edu>
From: alexander.s at mccd.edu (Steven Alexander)
Subject: previledge password in cisco routers

Do a whois on the domain that the router belongs to and email the
contact with:
 
"i ar3 ty1ng to h4ck yur b0x.  pl33z3 h3lp."
 
That should take care of everything.

	-----Original Message-----
	From: john morris [mailto:me.morris@...il.com] 
	Sent: Wednesday, November 24, 2004 1:15 AM
	To: Scott T. Cameron
	Cc: full-disclosure@...ts.netsys.com
	Subject: Re: [Full-Disclosure] previledge password in cisco
routers
	
	

	Ooops.. i reframe my question. Is there a way to get the enable
	password remotely . Brute force is not my option
	
	
	
	(FROM LINKS TO LINKS WE ARE ALL LINKED)
	
	cheersssss.....
	
	morris
	
	_______________________________________________
	Full-Disclosure - We believe in it.
	Charter: http://lists.netsys.com/full-disclosure-charter.html
	
	
______________________________________________________________________
	This email has been scanned by the MessageLabs Email Security
System.
	For more information please visit
http://www.messagelabs.com/email
	
______________________________________________________________________
	

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041124/9de5ea9d/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ