Solved

Cisco password decryptor

Posted on 2015-01-25
6
203 Views
Last Modified: 2015-01-25
Does Cisco have any password decryptor tools? I have an ASA and I am not sure if this can be decrypted (see below)

username myname password JFscEFSDfsdffsfss encrypted

Thanks
0
Comment
Question by:leblanc
  • 2
  • 2
  • 2
6 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 40569345
Cain & Abel may be able to do it.  I've used it on the VPN group passwords but I can't say for sure that it can crack the username password.
0
 
LVL 6

Expert Comment

by:Matt
ID: 40569427
You can decrypt "password 7", other maybe with special tools.
0
 
LVL 1

Author Comment

by:leblanc
ID: 40569537
C&A cannot do it. I do not like the online password decrypt tool. Is there any software?
Also, with username myname password JFscEFSDfsdffsfss encrypted, doesn't it mean that the password is encrypted and it is not level 7?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 6

Accepted Solution

by:
Matt earned 250 total points
ID: 40569543
Yes, you can decrypt only passwords with level 7. All other (encrypted) is no go...

You can of course try to do password recovery - reboot ASA, break boot sequence...

https://supportforums.cisco.com/document/79016/asa-password-recovery
0
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 250 total points
ID: 40569615
Also, with username myname password JFscEFSDfsdffsfss encrypted, doesn't it mean that the password is encrypted and it is not level 7?
Correct. The username password does not use weak encryption.

And if C&A cant's crack the password, you'll be forced to perform a password recovery.
0
 
LVL 1

Author Comment

by:leblanc
ID: 40569619
that is my next step. Thx
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now