[cisco-voip] Bash script to decrypt DRS backups
Pete Brown
jpb at chykn.com
Wed Mar 9 20:47:05 EST 2016
Just out of curiosity, what's the use case? And what version(s) would it be used with?
Thanks,
Pete
________________________________
From: cisco-voip <cisco-voip-bounces at puck.nether.net> on behalf of voip--- via cisco-voip <cisco-voip at puck.nether.net>
Sent: Monday, March 7, 2016 2:49 AM
To: cisco-voip at puck.nether.net
Subject: [cisco-voip] Bash script to decrypt DRS backups
Hi All,
Been struggling with this; I know that the CUCM DRS backup's are encrypted with a random password and that the random password is encrypted with the Cluster Security password. I'm trying to come up with a Bash script to decrypt. I know Pete Brown came up with this tool for windows: http://www.adhdtech.com/uctools.html however it looks like it's closed source so I'm not sure how the decryption function works.
UC Tools - Welcome to ADHDTech<http://www.adhdtech.com/uctools.html>
www.adhdtech.com
These tools are free to download. I'm making them available because I believe that an organization should have visibility to all data in the systems it purchases.
>From looking through the logs, it looks like some sort of byte to hex conversion takes place in the random password generation and my best guess is the SHA-256 hash value of that password is then added to the XML. Hoping that maybe Pete can shed some light in to this process?
Thanks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20160310/50d9dbb1/attachment.html>
More information about the cisco-voip
mailing list