[cisco-voip] Bash script to decrypt DRS backups

Pete Brown jpb at chykn.com
Wed Mar 9 20:47:05 EST 2016


Just out of curiosity, what's the use case?  And what version(s) would it be used with?

Thanks,
Pete

________________________________
From: cisco-voip <cisco-voip-bounces at puck.nether.net> on behalf of voip--- via cisco-voip <cisco-voip at puck.nether.net>
Sent: Monday, March 7, 2016 2:49 AM
To: cisco-voip at puck.nether.net
Subject: [cisco-voip] Bash script to decrypt DRS backups


Hi All,

Been struggling with this; I know that the CUCM DRS backup's are encrypted with a random password and that the random password is encrypted with the Cluster Security password. I'm trying to come up with a Bash script to decrypt. I know Pete Brown came up with this tool for windows: http://www.adhdtech.com/uctools.html however it looks like it's closed source so I'm not sure how the decryption function works.

UC Tools - Welcome to ADHDTech<http://www.adhdtech.com/uctools.html>
www.adhdtech.com
These tools are free to download. I'm making them available because I believe that an organization should have visibility to all data in the systems it purchases.



>From looking through the logs, it looks like some sort of byte to hex conversion takes place in the random password generation and my best guess is the SHA-256 hash value of that password is then added to the XML. Hoping that maybe Pete can shed some light in to this process?

Thanks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20160310/50d9dbb1/attachment.html>


More information about the cisco-voip mailing list