![]() You might have better luck with a bit of lateral thinking. The time required to brute force a complex password will depend on the character set used in the password, the length of the password, and the speed of the computer that is running Cain & Abel. ![]() ![]() You can try to brute force it with John the Ripper, or Cain and Abel, or some precomputed rainbow table. If you have the password in encrypted format, you might luck out if it is a commonly-used value such as 8Ry2YjIyt7RRXU24 (password is blank) or 2KFQnbNIdI.2KYOU (password is “cisco”). Or they have a copy of the config but the password was stored in the encrypted format. In most cases, the device was deployed a long time ago and nobody remembers the password. From time to time, I get a service call asking me to break into a Cisco router or an ASA or a PIX.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |