[cisco-voip] Recovering UCOS Passwords - Round 281

Daniel daniel at ohnesorge.me
Thu Dec 6 17:32:00 EST 2018


Whatever method you are using to decode the passphrase will be obsolete 
in versions 10.5(2)su7, 11.5(1)su4 and 12.0(1)su2 (and above) as they 
are using a new method to decode the passphrase.


On 6/12/18 5:33 am, Pete Brown wrote:
> I'm sure some of you noticed, but earlier this year Cisco started 
> releasing patches to kill off the last sanctioned method of getting to 
> platformConfig.xml.  When you run "utils create report platform" on 
> recent versions, it's no longer in the report.  Someone in Boxborough 
> really knows how to put the "cus(s)" in "customers"!
>
> https://quickview.cloudapps.cisco.com/quickview/bug/CSCvh62145
>
> I'm testing a new version of the UCOS Password Decrypter that acquires 
> the file for you.  To use this feature, you enable remote support on 
> your UCOS host then plug in the UCOS host IP, remote support user and 
> remote support passphrase.  The app decodes the passphrase, pulls the 
> file via SSH and displays the passwords.
>
> Need a few volunteers to test before I update the tools page. If 
> you're interested, let me know.  Would post a temp link here but I 
> don't want yet another dead link floating around.
>
> -Pete
>
>
> _______________________________________________
> cisco-voip mailing list
> cisco-voip at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-voip

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20181207/58d18d08/attachment.html>


More information about the cisco-voip mailing list