[c-nsp] ios 7

Matt Hill Matt.Hill at aapt.com.au
Thu Apr 28 19:40:06 EDT 2005


You can also use boson getpass if you like windows:

http://www.boson.com/promo/getpass_utility.htm

Cheers,
Matt

-- 
Matt Hill
DPS - Internet Engineering
Alcatel Australia Pty Ltd
180-188 Burnley St
Richmond, Vic, AU 3121
e: matt.hill at aapt.com.au
v: +61 3 8687 5739
f: +61 3 8414 3115
m: ask and you may receive


-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Curtis Doty
Sent: Friday, 29 April 2005 3:42 AM
To: eusebio at palmanet.net
Cc: cisco-nsp at puck.nether.net
Subject: [c-nsp] ios 7

Eusebio López wrote:

>the configuration of my AP is the following:
>  
>

Kristófer's response already addresses the your issue of irb on an ap...and that it's just a bridge with trunking abilities and fancy-shmancy ssid handling.

But FYI, you also have compromised your radius secret. Please note that any "7" keys are not encrypted, but merely obfuscated. This creates more confusion and insecurity than if they were just left in the clear. A complete explanation and source code can be found here:

http://www.doty.org/blog/curtis/2004#ios7deobfuscate

Please note that it's an *expanded* version of the classic Perl by Riku Meskanen. It now allows the recovery of lost radius secrets, WEP keys, and more. For educational purposes only.

../C

_______________________________________________
cisco-nsp mailing list  cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


This communication, including any attachments, is confidential. If 
 you are not the intended recipient, you should not read it - please 
 contact me immediately, destroy it, and do not copy or use any part of 
 this communication or disclose anything about it.





More information about the cisco-nsp mailing list