Government Security
Network Security Resources

Jump to content

Photo

Cisco Password Decrypt (question)


  • Please log in to reply
17 replies to this topic

#1 s3cure

s3cure

    Private

  • Members
  • 10 posts

Posted 24 November 2007 - 09:37 AM

Hi, ;)
do you know a tool to decrypt the Cisco type 5 password? (and any other types) (for any other type i used : Cain and Solarwinds)

I need To decrypt enable secret password. (enable secret 5 $1$/ICS$39AhEW.AA9gEXLeHhX.gC0).
(I need to decrypt ... :-)

ThanX
s3cure

#2 Guest_DiabloHorn_*

Guest_DiabloHorn_*
  • Guests

Posted 24 November 2007 - 01:31 PM

read up on what type 5 means.

it's a md5 hash...so just try md5 hash breakers...

then again I only did a quick 1min google research so I could be wrong who knows...

#3 s3cure

s3cure

    Private

  • Members
  • 10 posts

Posted 24 November 2007 - 02:20 PM

read up on what type 5 means.

it's a md5 hash...so just try md5 hash breakers...

then again I only did a quick 1min google research so I could be wrong who knows...


Thx for Reply My Friend ...
I know It's a Md5 Hash but It's Different with General Md5 ...
I search in Google but Type 5 secret passwords use a one-way hash algorithm and cannot be decrypted.

#4 Guest_DiabloHorn_*

Guest_DiabloHorn_*
  • Guests

Posted 24 November 2007 - 03:16 PM

sometimes I have got the impression I speak well I don't know swahili or something.

or maybe my slang use as a foreigner just sucks....anyways to make it easy for you....

http://membres.lycos.fr/mdcrack/

enjoy

#5 hm1ch

hm1ch

    Corporal

  • Members
  • 176 posts

Posted 24 November 2007 - 03:50 PM

Your hash is a md5 hash but it's salted so you can't use rainbow tables.

The best you have is to bruteforce it or to try wordlist.
As DiabloHorn said, you can try mdcrack or JTR.
"Member of #rainbowcrack @ irc.plain-text.info"
Best online MD5/LM/NTLM webcracker - http://www.plain-text.info

#6 buzzons

buzzons

    Retired GSO Second Lieutenant

  • Sergeant Major
  • 1,818 posts

Posted 24 November 2007 - 04:10 PM

if it is off a cisco box you don't even need to do anything.. the password generator on cisco kit is flawed, and can be easily reversed. You can use tools like

http://www.kazmier.c...co-noswing.html

and

http://users.skynet.be/glu/ciscopw.htm

to tell you what they are instantly

#7 Guest_DiabloHorn_*

Guest_DiabloHorn_*
  • Guests

Posted 24 November 2007 - 04:56 PM

buzzons those are for the type 7

#8 s3cure

s3cure

    Private

  • Members
  • 10 posts

Posted 24 November 2007 - 11:24 PM

buzzons those are for the type 7



Cisco IOS telnet logon password hashes come in two flavors: Type 7 and MD5.
A Cisco config file with both password hashes might look something like this:

enable secret 5 $1$0Z4m$jsbSzU.vYSsZFISdJtbQI4
enable password 7 062E0A1B38411F1D5C

The line beginning with enable password 7 is Type 7 password hash. The line with enable secret 5 is the newer MD5 style.
The Type 7 password hashes aren't really hashes, and can easily be cracked by many tools.
MD5 hash is always 128-bits (16 double-byte characters) and Cisco "MD5" hash, including the $1, it's only 15-double byte characters (or 120-bits).

I know Cain and John the Ripper are able to break a Cisco IOS MD5 password hash but this way is very slow and Heavy!
=======
(http://www.oxid.it/d.../pix_passwd.txt)

#9 lut4

lut4

    Specialist

  • Members
  • 104 posts

Posted 25 November 2007 - 03:44 AM

I tried to crack it with john and the password(i think) is hasan? Can somebody verify that?

#10 jacco

jacco

    Private First Class

  • Members
  • 58 posts

Posted 25 November 2007 - 08:00 AM

the md5 hash of hasan is :
fc3f318fba8b3c1502bece62a27712df

I dont know for the type 7 password

Greetingz,
Jacco

#11 lut4

lut4

    Specialist

  • Members
  • 104 posts

Posted 25 November 2007 - 08:04 AM

the md5 hash of hasan is :
fc3f318fba8b3c1502bece62a27712df

I dont know for the type 7 password

Greetingz,
Jacco

ain't the type 5 a new md5 hash type?

p.s it is type 5 we are talking about

#12 s3cure

s3cure

    Private

  • Members
  • 10 posts

Posted 25 November 2007 - 09:17 AM

I tried to crack it with john and the password(i think) is hasan? Can somebody verify that?


yes hasan is true !
I cracked it with Cain (around 2-3 hour) !

#13 lut4

lut4

    Specialist

  • Members
  • 104 posts

Posted 25 November 2007 - 10:24 AM

i used 10 min..

#14 Ami

Ami

    Private

  • Members
  • 1 posts

Posted 15 November 2010 - 07:26 AM

Please help decrypt this password

asa 5500
enable password 6kJeoLUF68SUynuL encrypted

#15 E411

E411

    Private

  • Members
  • 17 posts

Posted 15 November 2010 - 11:30 AM

Please help decrypt this password

asa 5500
enable password 6kJeoLUF68SUynuL encrypted


I could be wrong (new here), but gather these types of posts are frowned upon.

That is a Cisco PIX style password crypt and is a base-64 encoded MD5 hash. You can try to run dictionary or brute force attacks using john the ripper (JtR).

I tried it out of curiosity and it's not an extremely simple password. (not in the default dictionary, even using my special mangling ruleset). I tried around 50 million combinations with no luck.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users