From: Marc Ruef (maru@scip.ch)
Date: Wed Sep 03 2003 - 08:22:16 EDT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Dear List,
I have to do a security audit for one of our customers. I was
able to catch some config files of their Netscreen devices.
There is a line "set admin password" where follows the
encrypted or hashed password.
Does somebody know how to crack it or what kind of
encryption/hash is used? I can't find a source that provides
me the information I am looking for. John the Ripper can't
recognize the encrpytion and abords his attempt.
Sincerely,
Marc Ruef
- --
) scip AG (
Technoparkstr. 1
8005 Zürich
T +41 1 445 18 18
F +41 1 445 18 19
maru@scip.ch
www.scip.ch - Publizierung aktuellster IT-Sicherheitsluecken -
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0
iQA/AwUBP1Xc9xe5hzJzqVMhEQK4OgCghg1yv3qwB+RXRgPGV+fcNDoBI2oAoKCJ
rm2p6OWBoKaH4ggnlke23tsB
=SyXf
-----END PGP SIGNATURE-----
---------------------------------------------------------------------------
FREE Trial!
New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL
and PROFESSIONAL TL software. Fast, reliable vulnerability assessment
technology powered by the award-winning FoundScan engine. Try it free for 21 days at: http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:39 EDT