Security Basics mailing list archives
Re: CISCO MD5 encryption
From: Paul Johnston <paul.johnston () pentest co uk>
Date: Fri, 25 Feb 2011 14:33:52 +0000
Hi,
Since you can copy the running configuration text file to a virgin device and it all works, I'd say that there's an excellent chance that any password entered will be accepted if the hash matches -- that is, an engineered collision is as good as recovery of the actual password.
I expect you're right, at least that if you found another password that hashed to the same as the stored hash you'd get in. But that is not what the collision attacks are about. They let you find two strings, s1 and s2 where s1!=s2 but h(s1)==h(s2). They do not help you find s1 when you already know h(s1). To use an engineered collision, you'd have to be able to control the stored hash, or the administrator's password. Clearly if you can do that, you have easier routes to take control of the system that any cryptographic attack. Paul -- Pentest - When a tick in the box is not enough Paul Johnston - IT Security Consultant / Tiger SST Pentest Limited - ISO 9001 (cert 16055) / ISO 27001 (cert 558982) Office: +44 (0) 161 233 0100 Mobile: +44 (0) 7817 219 072 Email policy: http://www.pentest.co.uk/legal.shtml#emailpolicy Registered Number: 4217114 England & Wales Registered Office: 26a The Downs, Altrincham, Cheshire, WA14 2PU, UK ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Re: CISCO MD5 encryption, (continued)
- Re: CISCO MD5 encryption Mike Hale (Feb 22)
- Re: CISCO MD5 encryption Prabath Siriwardana (Feb 22)
- Re: CISCO MD5 encryption Mike Hale (Feb 22)
- Re: CISCO MD5 encryption Prabath Siriwardana (Feb 22)
- Message not available
- Re: CISCO MD5 encryption Prabath Siriwardana (Feb 22)
- Re: CISCO MD5 encryption Saif El Sherei (Feb 23)
- Re: CISCO MD5 encryption Saif El Sherei (Feb 23)
- Re: CISCO MD5 encryption Jeffrey Walton (Feb 24)
- Re: CISCO MD5 encryption Paul Johnston (Feb 24)
- RE: CISCO MD5 encryption David Gillett (Feb 24)
- Re: CISCO MD5 encryption Paul Johnston (Feb 25)
- RE: CISCO MD5 encryption David Gillett (Feb 28)
- Re: CISCO MD5 encryption Security Manager (Feb 24)
- Re: CISCO MD5 encryption César García (Feb 24)
- Re: CISCO MD5 encryption Security Manager (Feb 24)