![]() To learn more about MD5, visit The MD5 Message-Digest Algorithm or read. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit 'fingerprint' or 'message digest' of the input. Note the use of this library in Python 3.x requires that the string be in byte string format (encoded). If there are other hash algorithms that Cisco currently or has historically used, then I'd like to have the code for those algorithms as well. The MD5 message-digest algorithm is a cryptographically broken but still widely used hash function producing a 128-bit hash value. Using python from the command line we can generate the MD5 hash of a string using the hashlib library. I presume that the "5" in the hashed result is some sort of hash algorithm identifier. I want code that translates "foobar" to "5 $1$pdQG$0WzLBXV98voWIUEdIiLm11", so that I can generate the already-hashed passwords in my config-generation tool, rather than putting cleartext passwords in the generated configs and waiting for the router to generate the hash. Then when I do a 'show config' command (assuming I have "service password-encryption" enabled), what I see is something like this: enable secret 5 $1$pdQG$0WzLBXV98voWIUEdIiLm11 This allows you to input an MD5, SHA-1, Vbulletin, Invision Power Board, MyBB, Bcrypt, Wordpress, SHA-256, SHA-512, MYSQL5 etc hash and search for its corresponding plaintext ('found') in our database of already-cracked hashes. ![]() I need this for an automated config-file generator that I'm working on ( Netomata Config Generator).īasically, what I want is the Cisco equivalent of the "htpasswd" command used for web servers.įor example, when I put the following command with clear-text password into a Cisco config: enable secret foobar I'm not trying to break into anything I'm trying to generate the appropriate "enable secret" line given a clear text password, not decode an existing "enable secret" line with a hashed password. ![]() Does anyone have a pointer to code (or just the algorithm) that Cisco uses to generate their password hashes for things like "enable secret"? ![]()
0 Comments
Leave a Reply. |