In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
The password cracking of the Cisco nexus switch is slightly different from that of the catalyst switch. I feel that the password cracking of the nexus switch is relatively simple, so let's briefly talk about the cracking process.
Connect the console cable, power on, and press ctrl+], as follows:
(C) Copyright 2014, Cisco Systems.
N3K-C3548P-10GX BIOS v.2.0.6, Wed 12/24/2014, 04:15 PM
ERROR: C2:V1050007 I0 93B80003-9FB3-11D4-9A3A-0090273FC14D BE3A5018
(C) Copyright 2014, Cisco Systems.
N3K-C3548P-10GX BIOS v.2.0.6, Fri 12/26/2014
Booting kickstart image: bootflash:/n3500-uk9-kickstart.6.0.2.A7.2.bin
....
.. Image verification OK
Booting kernel
[0.000000] Fastboot Memory at 0c100000 of size 201326592
] ^] Usage: init 0123 ^] POST INIT Starts at Fri Feb 23 05:42:33 UTC 2018
[] Starting Nexus 3500 Platform POST.
Executing Mod 1 1 SEEPROM Test:...done (0 seconds)
Executing Mod 1 1 GigE Port Test:.] ^]] ^] done (8 seconds)
Executing Mod 1 1 PCIE Test:.done (0 seconds)
Mod 1 1 Post Completed Successfully
POST is completed
^]. ^] ^]].]] ^] r. Done.
The red parts above all appear when I press ctrl+], it doesn't matter.
INIT: Sending processes the TERM signal
INIT: Sending processes the KILL signal
^] Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2002-2016, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
Owned by other third parties and used and distributed under
License. Certain components of this software are licensed under
The GNU General Public License (GPL) version 2.0 or the GNU
Lesser General Public License (LGPL) Version 2.1. A copy of each
Such license is available at
Http://www.opensource.org/licenses/gpl-2.0.php and
Http://www.opensource.org/licenses/lgpl-2.1.php
Switch (boot) #
When you see the switch entering (boot) # mode, the cracking work is almost complete.
Switch (boot) # conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch (boot) (config) # admin-password?
Password for user admin (Max Size-64)
Switch (boot) (config) # admin-password cisco@1234
Change the password of admin to cisco@1234
WARNING! Enabling local authentication for login through console due to password recovery
Switch (boot) (config) # exit
Switch (boot) # dir
4096 Jan 01 2001 00:01:42 .patch /
0 Jan 01 2001 00:02:33 20010101_000233_poap_3976_init.log
0 Jan 27 2018 05:09:48 20180127_050948_poap_3996_init.log
0 Jan 27 2018 05:18:36 20180127_051836_poap_3996_init.log
627 Nov 18 2016 14:15:16 license_FOC2043R0MB_15_1.lic
4096 Nov 18 2016 14:25:17 lost+found/
36825088 Nov 18 2016 14:09:09 n3500-uk9-kickstart.6.0.2.A7.2.bin
181796339 Nov 18 2016 14:09:31 n3500-uk9.6.0.2.A7.2.bin
1024 Jan 01 2001 00:01:30 sprom_cstruct_2_0_0
1024 Jan 01 2001 00:02:12 sprom_cstruct_3_0_0
4096 Jan 01 2001 00:01:40 vdc_2/
4096 Jan 01 2001 00:01:40 vdc_3/
4096 Jan 01 2001 00:01:40 vdc_4/
4096 Jan 01 2001 00:01:43 virtual-instance/
Usage for bootflash: filesystem
0 bytes used
2147483647 bytes free
2147483647 bytes total
Switch (boot) # load n3500-uk9.6.0.2.A7.2.bin
Reboot the system
Loading System Software Fri Feb 23 05:46:18 UTC 2018
System Software (/ bootflash/n3500-uk9.6.0.2.A7.2.bin) Loaded Fri Feb 23 05:46:36 UTC 2018
Ethernet switching mode
INIT: Switching to runlevel: 3
INIT: Sending processes the TERM signal
INIT: (boot) #
Mounting other filesystems: [OK]
User Access Verification
WYLZ-NX3548 login: admin
Password:
You can log in with the modified password, and the cracking work has been completed here.
Description:
1. Press ctrl+] when starting up, keep pressing, otherwise it is possible to skip (boot) # mode.
2. The password cracking of Cisco MDS switch is almost the same as that of Nexus, and the process can be used for reference.
The link to the Nexus3548 password cracking document was not found. A link to the MDS switch password cracking document is attached below.
Https://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/sw/6_2/configuration/guides/security/nx-os/sec_cli_6-x.pdf?dtid=osscdc000283
On page 70 of the document. MDS will meet, and so will Nexus.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
#! / bin/bash#for security of osfor ip in `cat ip.txt`doecho-e "\ 033 [31m#$ip #
© 2024 shulou.com SLNews company. All rights reserved.