Greetings! http://www.alcrypto.co.uk/cisco/ should do the job for PASSWORDs - the SECRET you found is much more complicated to crack as the algorithm is different. Packetstorm again has these (bit dated) files, too. Bye Volker Jason binger schrieb: > I am currently performing a penetration test and > managed to pull down the config using a HTTP > vulnerability in the cisco interface. > > How do I crack the following password gained from the > following line of the config? > > enable secret 5 $1$6Je2$MurE4FTzoZjQShRW4Ui9H0 > > (the password has been changed) > > Jason > > __________________________________________________ > Do You Yahoo!? > Make a great connection at Yahoo! Personals. > http://personals.yahoo.com > > ---------------------------------------------------------------------------- > This list is provided by the SecurityFocus Security Intelligence Alert (SIA) > Service. For more information on SecurityFocus' SIA service which > automatically alerts you to the latest security vulnerabilities please see: > https://alerts.securityfocus.com/ -- Volker Tanger <volker.tangerat_private> Wrangelstr. 100, 10997 Berlin, Germany DiSCON GmbH - Internet Solutions http://www.discon.de/ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Mon Oct 15 2001 - 15:49:17 PDT