Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c822a145-e073-3909-d37e-a3df1bf6957f@atenlabs.com>
Date: Fri, 14 Apr 2017 10:13:07 -0700
From: Dan Tentler <dan@...nlabs.com>
To: john-users@...ts.openwall.com
Subject: Cracking cisco asa passwords

Hey everyone.

So this morning the shadowbrokers dropped another leak, and in this leak
there were cisco asa passwords in text config files.
I wanted to take a whack at cracking them, so I put the hashes together,
on their own, in a text file:

nBd5PIrLLusBciHPhs0PBnMtk5Dm5n
nG5aE+reBeQIcQYK4sPHRuHtGdG0Kn
nLtbNIrRDSPEcrMDFs7MT5Htz8Cifn
nF3dKrrkHDHCckxALsfARkBtenLoAn
nMSQP4rHLyxHcWqBmsqP9pMtnMGPYn

However, magnums version of john can't seem to identify them.
some simple google searches for cracking asa passwords hasn't turned up
anything either. Just super old posts from 2010 about cracking pix-md5
stuff.

Anybody have any clues or leads?

-Dan


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.