Penetration Testing mailing list archives
Cisco Catalyst 4006 CatOS Password Hash
From: "Paul Bakker" <bakker () fox-it com>
Date: Wed, 10 Dec 2003 12:32:31 +0100
During a pentest/audit I received from the client the configurations for their Cisco Catalyst 4006 and their other Cisco IOS switches. The passwords in the Cisco IOS configuration file are in in the known usual format of the FreeBSD MD5 hash... Like $1$xxxx$xxxxxxxxxxxxxxxxxxx These are easily crackable/recognized by both John the Ripper and Cain&Abel. The passwords on the Catalyst are in the same format (for the eye), but instead of starting with $1$ they start with $2$..... Both John and Cain do not recognize these hashes. Can anybody shed some light on the hash function used to create these and any tools that can be used to eudit the password strenght of these passwords (Or how John or Cain can be sed for this...) -- Paul Bakker --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 10)
- Re: Cisco Catalyst 4006 CatOS Password Hash Miles Stevenson (Dec 10)
- RE: Cisco Catalyst 4006 CatOS Password Hash Joey Peloquin (Dec 10)
- Re: Cisco Catalyst 4006 CatOS Password Hash Frisbie (Dec 12)
- <Possible follow-ups>
- Re: Cisco Catalyst 4006 CatOS Password Hash miguel . dilaj (Dec 10)
- RE: Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 11)
- Re: Cisco Catalyst 4006 CatOS Password Hash Anders Thulin (Dec 12)
- RE: Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 11)
- RE: Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 11)