I’ve got a copy of a Cisco ASA config and i want to crack the following example passwords
I’ve got the following lines in the config
ASA Version 8.4(2)
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
So I want to try and crack the enable password, but i don’t know what format it is or what tool i can use to brute force it. (Note the hash there is not the real hash, just a random hash i found online like the original)
I already know the password is “cisco” for passwd, but if that was different, how can i go about cracking it? Are these two passwords the same format/hash type (the first doesn’t have any ‘punctuation’ but that might just be by chance.
I’m familiar with cracking the MD5 passwords, level/type 7 ‘secrets’ etc but not cracking the enable password for IOS devices.
Extra Credit:
There are also the following lines with multiple usernames in it which i assume are the same format as above.
!
no threat-detection statistics tcp-intercept
ntp server
webvpn
username test password hmQhTUMT1T5Z4KHC encrypted privilege 15
!
I tried adding the ‘known’ cisco hash into the PIX-MD5 in cain manually, but it didn’t work (used a dict with cisco in it). See below:
![enter image description here](https://i.stack.imgur.com/ZNWuh.png)
Hope someone can help,
Thanks!
Continue reading Cracking CISCO ASA Passwords→