From: Jordan Wiens (jwiens@nersp.nerdc.ufl.edu)
Date: Thu Sep 04 2003 - 14:05:08 EDT
Rather than writing your own script for it, I'd use some of the existing
md5 crackers out there. My favorite is mdcrack; older but very fast.
Much faster than a do it yourself using system libraries to generate md5s.
http://membres.lycos.fr/mdcrack/
-- Jordan Wiens, CISSP UF Network Incident Response Team (352)392-2061 On Thu, 4 Sep 2003 lawal@shaw.ca wrote: > Hi Marc, > > I believe the config files have an MD5 hash of teh actual password. If you haver access to the config file, which obviously reveals the hash, you can perform a brute force attack on the password. You can write a script that will generate a random password, and take the MD5 hash of it. Then compare the MD5 hash from the password generated by the scriot with the hash obtained from the config file. If it matches, then you have the password. However, cracking the password does not automatically give you access to the Netscreen device. If the administratotr has disabled all management features from the WAN side, you will be unable to get in. However, if you have compromised a host on the internal LAN, then, you can probably get on to the netscreen device from the inside. --------------------------------------------------------------------------- FREE Trial! New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL and PROFESSIONAL TL software. Fast, reliable vulnerability assessment technology powered by the award-winning FoundScan engine. Try it free for 21 days at: http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825 ----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:39 EDT