[c-nsp] disable break on boot for IOS??

Ivan Pepelnjak ip at ioshints.info
Tue Jul 14 01:43:08 EDT 2009


Just make sure you test the feature (for each ROMMON release you're using)
with a known enable password first. It's somewhat impossible to break into
some ROMMON versions.

http://blog.ioshints.info/2007/12/recovering-from-disabled-password.html

Ivan
 
http://www.ioshints.info/about
http://blog.ioshints.info/

> -----Original Message-----
> From: Matthew Huff [mailto:mhuff at ox.com] 
> Sent: Monday, July 13, 2009 11:31 PM
> To: 'neal rauhauser'; 'cisco-nsp at puck.nether.net'
> Subject: Re: [c-nsp] disable break on boot for IOS??
> 
> If you are running a newer IOS and newer ROMMON you can 
> disable password-recover (i.e. break during boot) using "no 
> service password-recovery". Make sure to read 
> http://www.cisco.com/en/US/docs/ios/12_3/12_3y/12_3ya8/gtnsvpw
> d.html completely, you can brick a router otherwise.
> 
> 
> 
> 
> ----
> Matthew Huff       | One Manhattanville Rd
> OTA Management LLC | Purchase, NY 10577
> http://www.ox.com  | Phone: 914-460-4039
> aim: matthewbhuff  | Fax:   914-460-4139
> 
> 
> 
> > -----Original Message-----
> > From: cisco-nsp-bounces at puck.nether.net [mailto:cisco-nsp- 
> > bounces at puck.nether.net] On Behalf Of neal rauhauser
> > Sent: Monday, July 13, 2009 5:11 PM
> > To: cisco-nsp at puck.nether.net
> > Subject: [c-nsp] disable break on boot for IOS??
> >
> >    I have a situation with a former employee who still has 
> legitimate 
> > physical access to a shared space where we have some Cisco 
> equipment.
> > Today
> > one of our field guys located a UBR924 attached to our cable modem 
> > plant with the cutest little rogue Linux machine attached to its 
> > ethernet port.
> >
> >    I had them recover the router's password as the first 
> step and now 
> > I'm puzzling over this:
> >
> > 
> http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_not
> > e
> > 09186a008022493f.shtml
> >
> >
> >    I recall that a machine can be set such that the break 
> during boot 
> > will not permit password recovery, but it isn't clear to me 
> how I do 
> > it. I'd really like to get this machine secured so I can dig in to 
> > what he is doing.
> > I'd already isolated this cable plant because I knew intrusion was 
> > possible but I want to see what other mischief he uses our 
> facilities 
> > for - a little spice for the already meaty intrusion case 
> against him 
> > this spring.
> >
> > --
> > mailto:Neal at layer3arts.com //
> > GoogleTalk: nrauhauser at gmail.com
> > IM: nealrauhauser
> > _______________________________________________
> > cisco-nsp mailing list  cisco-nsp at puck.nether.net 
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> 



More information about the cisco-nsp mailing list