|
Message-ID: <c822a145-e073-3909-d37e-a3df1bf6957f@atenlabs.com> Date: Fri, 14 Apr 2017 10:13:07 -0700 From: Dan Tentler <dan@...nlabs.com> To: john-users@...ts.openwall.com Subject: Cracking cisco asa passwords Hey everyone. So this morning the shadowbrokers dropped another leak, and in this leak there were cisco asa passwords in text config files. I wanted to take a whack at cracking them, so I put the hashes together, on their own, in a text file: nBd5PIrLLusBciHPhs0PBnMtk5Dm5n nG5aE+reBeQIcQYK4sPHRuHtGdG0Kn nLtbNIrRDSPEcrMDFs7MT5Htz8Cifn nF3dKrrkHDHCckxALsfARkBtenLoAn nMSQP4rHLyxHcWqBmsqP9pMtnMGPYn However, magnums version of john can't seem to identify them. some simple google searches for cracking asa passwords hasn't turned up anything either. Just super old posts from 2010 about cracking pix-md5 stuff. Anybody have any clues or leads? -Dan
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.