Date: Mon, 15 May 2006 03:17:45 +0400 From: Solar Designer To: [email protected] Subject: Re: Cisco Type 5 Passwords On Sun, May 14, 2006 at 03:34:58PM -0400, Amir Sadoughi wrote: > I have heard it is possible to utilize JTR to crack Cisco Type 5 passwords, but I believe the passwords are hashed 1000 times with MD5 and then Base64 encoded, or something like that.
Need help accessing a used router? Or perhaps you’ve just misplaced the “Enable Password” and don’t have access to “Privileged EXEC mode”? Here are some step by step instructions and explanations each step of the way to help you get through your problem! 1.Turn off or shut down the router 2.
Take out the Compact flash of the router (this step will ensure that the router boots into rommon mode which is where we can bypass the current config file) 3. Turn on the router.
You should see the following prompt. Reinsert the compact flash card into the router. From the rommon prompt type “confreg 0x2142” and “reset” which may look like this rommon 1confreg 0x2142 rommon 2reset Changing the configuration register to 0x2142 tells the router to bypass the current configuration file and load as if there is no configuration file on the router, and then the “Reset” command will take us out of rommon mode and boot the router like normal now that the flash is reinserted. Wait for the router to boot up and enter “No” when prompted to enter the initial configuration dialogue. System Bootstrap, Version 15.0(1r)M1, RELEASE SOFTWARE (fc1) Copyright (c) 2009 by cisco Systems, Inc.