Cracking CISCO ASA Passwords

I’ve got a copy of a Cisco ASA config and i want to crack the following example passwords

I’ve got the following lines in the config

ASA Version 8.4(2)

!

hostname ciscoasa

enable password 8Ry2YjIyt7RRXU24 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

So I want to try and crack the enable password, but i don’t know what format it is or what tool i can use to brute force it. (Note the hash there is not the real hash, just a random hash i found online like the original)

I already know the password is “cisco” for passwd, but if that was different, how can i go about cracking it? Are these two passwords the same format/hash type (the first doesn’t have any ‘punctuation’ but that might just be by chance.

I’m familiar with cracking the MD5 passwords, level/type 7 ‘secrets’ etc but not cracking the enable password for IOS devices.

Extra Credit:

There are also the following lines with multiple usernames in it which i assume are the same format as above.

!

no threat-detection statistics tcp-intercept

ntp server

webvpn

username test password hmQhTUMT1T5Z4KHC encrypted privilege 15

!

I tried adding the ‘known’ cisco hash into the PIX-MD5 in cain manually, but it didn’t work (used a dict with cisco in it). See below:
enter image description here

Hope someone can help,
Thanks!

Continue reading Cracking CISCO ASA Passwords