In most cases you would be correct. However, I merely wanted to point out how easy it was reverse a Cisco password. I've seen instances where network engineers didn't wipe a config before selling their old gear which if they're using the same passwords across their network, a crack of the old gear makes their new systems vulnerable. Additionally, I've seen people post their configs thinking that the encrypted form of their password was safe. There are tons of tools for cracking MD7 passwords and lets not forget that there are Rainbow tables and hash tables for MD5 as well.
I'm glad you thought so. I picked up that little tidbit browsing the internet one day and thought it was worth sharing.
have a any possibility to see enable secret password on encrypted key?
Very Good Ron: Excellent Videos very Helpful
Nice video the audio sounds earrape
Pretty cool vid, but the hacker would still need access to the key. Which couldn't be accessed unless they already had the correct passwords.
In most cases you would be correct. However, I merely wanted to point out how easy it was reverse a Cisco password. I've seen instances where network engineers didn't wipe a config before selling their old gear which if they're using the same passwords across their network, a crack of the old gear makes their new systems vulnerable. Additionally, I've seen people post their configs thinking that the encrypted form of their password was safe. There are tons of tools for cracking MD7 passwords and lets not forget that there are Rainbow tables and hash tables for MD5 as well.
This would be cool if someone threw away a working Cisco device, left it running, and left their laptop logged into it.
Fucking audio!