Penetration Testing mailing list archives
RE: Penetrating a Cisco Catalyst with CatOS
From: "Matt Dunlap" <Matt.Dunlap () clearone com>
Date: Wed, 20 Jul 2005 15:56:01 -0600
Hi Marc, The algorithm you are looking at is likely MD5. See: http://www.cisco.com/warp/public/701/64.html -- Matt Matt Dunlap Network Administrator 1825 West Research Way | Salt Lake City, UT 84119 P 801-303-3436 F 801-303-3346 M 801-891-0678 www.clearone.com Have you seen our new Website? -----Original Message----- From: Marc.Werner () t-systems com [mailto:Marc.Werner () t-systems com] Sent: Wednesday, July 20, 2005 6:22 AM To: pen-test () securityfocus com Subject: Penetrating a Cisco Catalyst with CatOS Hi list, in my actual pen-test-project I was able to get a cisco-config by SNMP. The passwords are encrypted. Does anyone know the algorithm? The password hash starts with $2$, an "normal" IOShash starts with $1$. Is it probably blowfish? Thanks for your help in advance!!! Mit freundlichen Grüßen / Kind regards Marc Werner T-Systems International GmbH Research & Development Engineer Technology Center Engineering Networks, Products & Services Multi Access Solutions & AAA Technologies Sendefunkstelle Haus 5, 25335 Elmshorn Tel +49 4121 29198819 PC Fax +49 1805 3344902042 Fax +49 4121 29198899 Mobil +49 170 5637815 E-Mail: marc.werner () t-systems com Internet: http://www.t-systems.com
Current thread:
- Penetrating a Cisco Catalyst with CatOS Marc . Werner (Jul 20)
- Re: Penetrating a Cisco Catalyst with CatOS Luis Cerdas (Jul 20)
- Re: Penetrating a Cisco Catalyst with CatOS Mario Platt (Jul 21)
- Message not available
- Re: Penetrating a Cisco Catalyst with CatOS Mark Teicher (Jul 20)
- Re: Penetrating a Cisco Catalyst with CatOS Luis Cerdas (Jul 20)
- <Possible follow-ups>
- RE: Penetrating a Cisco Catalyst with CatOS Wozny, Scott (US - New York) (Jul 20)
- RE: Penetrating a Cisco Catalyst with CatOS Matt Dunlap (Jul 20)