Penetration Testing mailing list archives
Re: Cisco Catalyst 4006 CatOS Password Hash
From: Miles Stevenson <miles () mstevenson org>
Date: Wed, 10 Dec 2003 12:22:51 -0500
Hi Paul. I believe $2$ is indicative of an SHA-1 hash, as opposed to MD5. -Miles On Wed, 2003-12-10 at 06:32, Paul Bakker wrote:
During a pentest/audit I received from the client the configurations for their Cisco Catalyst 4006 and their other Cisco IOS switches. The passwords in the Cisco IOS configuration file are in in the known usual format of the FreeBSD MD5 hash... Like $1$xxxx$xxxxxxxxxxxxxxxxxxx These are easily crackable/recognized by both John the Ripper and Cain&Abel. The passwords on the Catalyst are in the same format (for the eye), but instead of starting with $1$ they start with $2$..... Both John and Cain do not recognize these hashes. Can anybody shed some light on the hash function used to create these and any tools that can be used to eudit the password strenght of these passwords (Or how John or Cain can be sed for this...) -- Paul Bakker --------------------------------------------------------------------------- ----------------------------------------------------------------------------
-- Miles Stevenson miles () mstevenson org
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 10)
- Re: Cisco Catalyst 4006 CatOS Password Hash Miles Stevenson (Dec 10)
- RE: Cisco Catalyst 4006 CatOS Password Hash Joey Peloquin (Dec 10)
- Re: Cisco Catalyst 4006 CatOS Password Hash Frisbie (Dec 12)
- <Possible follow-ups>
- Re: Cisco Catalyst 4006 CatOS Password Hash miguel . dilaj (Dec 10)
- RE: Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 11)
- Re: Cisco Catalyst 4006 CatOS Password Hash Anders Thulin (Dec 12)
- RE: Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 11)
- RE: Cisco Catalyst 4006 CatOS Password Hash Paul Bakker (Dec 11)