Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Cisco Nexus 3548 password cracking

2025-01-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

The password cracking of the Cisco nexus switch is slightly different from that of the catalyst switch. I feel that the password cracking of the nexus switch is relatively simple, so let's briefly talk about the cracking process.

Connect the console cable, power on, and press ctrl+], as follows:

(C) Copyright 2014, Cisco Systems.

N3K-C3548P-10GX BIOS v.2.0.6, Wed 12/24/2014, 04:15 PM

ERROR: C2:V1050007 I0 93B80003-9FB3-11D4-9A3A-0090273FC14D BE3A5018

(C) Copyright 2014, Cisco Systems.

N3K-C3548P-10GX BIOS v.2.0.6, Fri 12/26/2014

Booting kickstart image: bootflash:/n3500-uk9-kickstart.6.0.2.A7.2.bin

....

.. Image verification OK

Booting kernel

[0.000000] Fastboot Memory at 0c100000 of size 201326592

] ^] Usage: init 0123 ^] POST INIT Starts at Fri Feb 23 05:42:33 UTC 2018

[] Starting Nexus 3500 Platform POST.

Executing Mod 1 1 SEEPROM Test:...done (0 seconds)

Executing Mod 1 1 GigE Port Test:.] ^]] ^] done (8 seconds)

Executing Mod 1 1 PCIE Test:.done (0 seconds)

Mod 1 1 Post Completed Successfully

POST is completed

^]. ^] ^]].]] ^] r. Done.

The red parts above all appear when I press ctrl+], it doesn't matter.

INIT: Sending processes the TERM signal

INIT: Sending processes the KILL signal

^] Cisco Nexus Operating System (NX-OS) Software

TAC support: http://www.cisco.com/tac

Copyright (c) 2002-2016, Cisco Systems, Inc. All rights reserved.

The copyrights to certain works contained in this software are

Owned by other third parties and used and distributed under

License. Certain components of this software are licensed under

The GNU General Public License (GPL) version 2.0 or the GNU

Lesser General Public License (LGPL) Version 2.1. A copy of each

Such license is available at

Http://www.opensource.org/licenses/gpl-2.0.php and

Http://www.opensource.org/licenses/lgpl-2.1.php

Switch (boot) #

When you see the switch entering (boot) # mode, the cracking work is almost complete.

Switch (boot) # conf t

Enter configuration commands, one per line. End with CNTL/Z.

Switch (boot) (config) # admin-password?

Password for user admin (Max Size-64)

Switch (boot) (config) # admin-password cisco@1234

Change the password of admin to cisco@1234

WARNING! Enabling local authentication for login through console due to password recovery

Switch (boot) (config) # exit

Switch (boot) # dir

4096 Jan 01 2001 00:01:42 .patch /

0 Jan 01 2001 00:02:33 20010101_000233_poap_3976_init.log

0 Jan 27 2018 05:09:48 20180127_050948_poap_3996_init.log

0 Jan 27 2018 05:18:36 20180127_051836_poap_3996_init.log

627 Nov 18 2016 14:15:16 license_FOC2043R0MB_15_1.lic

4096 Nov 18 2016 14:25:17 lost+found/

36825088 Nov 18 2016 14:09:09 n3500-uk9-kickstart.6.0.2.A7.2.bin

181796339 Nov 18 2016 14:09:31 n3500-uk9.6.0.2.A7.2.bin

1024 Jan 01 2001 00:01:30 sprom_cstruct_2_0_0

1024 Jan 01 2001 00:02:12 sprom_cstruct_3_0_0

4096 Jan 01 2001 00:01:40 vdc_2/

4096 Jan 01 2001 00:01:40 vdc_3/

4096 Jan 01 2001 00:01:40 vdc_4/

4096 Jan 01 2001 00:01:43 virtual-instance/

Usage for bootflash: filesystem

0 bytes used

2147483647 bytes free

2147483647 bytes total

Switch (boot) # load n3500-uk9.6.0.2.A7.2.bin

Reboot the system

Loading System Software Fri Feb 23 05:46:18 UTC 2018

System Software (/ bootflash/n3500-uk9.6.0.2.A7.2.bin) Loaded Fri Feb 23 05:46:36 UTC 2018

Ethernet switching mode

INIT: Switching to runlevel: 3

INIT: Sending processes the TERM signal

INIT: (boot) #

Mounting other filesystems: [OK]

User Access Verification

WYLZ-NX3548 login: admin

Password:

You can log in with the modified password, and the cracking work has been completed here.

Description:

1. Press ctrl+] when starting up, keep pressing, otherwise it is possible to skip (boot) # mode.

2. The password cracking of Cisco MDS switch is almost the same as that of Nexus, and the process can be used for reference.

The link to the Nexus3548 password cracking document was not found. A link to the MDS switch password cracking document is attached below.

Https://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/sw/6_2/configuration/guides/security/nx-os/sec_cli_6-x.pdf?dtid=osscdc000283

On page 70 of the document. MDS will meet, and so will Nexus.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report