[cisco-voip] Recovering UCOS Passwords - Round 281
Daniel
daniel at ohnesorge.me
Thu Dec 6 17:32:00 EST 2018
Whatever method you are using to decode the passphrase will be obsolete
in versions 10.5(2)su7, 11.5(1)su4 and 12.0(1)su2 (and above) as they
are using a new method to decode the passphrase.
On 6/12/18 5:33 am, Pete Brown wrote:
> I'm sure some of you noticed, but earlier this year Cisco started
> releasing patches to kill off the last sanctioned method of getting to
> platformConfig.xml. When you run "utils create report platform" on
> recent versions, it's no longer in the report. Someone in Boxborough
> really knows how to put the "cus(s)" in "customers"!
>
> https://quickview.cloudapps.cisco.com/quickview/bug/CSCvh62145
>
> I'm testing a new version of the UCOS Password Decrypter that acquires
> the file for you. To use this feature, you enable remote support on
> your UCOS host then plug in the UCOS host IP, remote support user and
> remote support passphrase. The app decodes the passphrase, pulls the
> file via SSH and displays the passwords.
>
> Need a few volunteers to test before I update the tools page. If
> you're interested, let me know. Would post a temp link here but I
> don't want yet another dead link floating around.
>
> -Pete
>
>
> _______________________________________________
> cisco-voip mailing list
> cisco-voip at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-voip
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20181207/58d18d08/attachment.html>
More information about the cisco-voip
mailing list