[cisco-voip] Recovering UCOS Passwords - Round 281

Pete Brown jpb at chykn.com
Sun Dec 9 19:47:44 EST 2018


Penguin,

Good question.  I've thought about it in the past and may eventually.  But the few times I've tried to get help, no one seemed interested.  My primary goal is to provide other engineers with tools that enhance their abilities to support customers and minimize downtime.  I really enjoy helping people and I don't mind putting in the work and releasing these tools for free.  However, I have a problem making it open source when no one has ever stepped up to help with the research or coding.

The original plan was actually to release these as paid tools.  Some of the early testers of the backup decrypter had to provide MAC addresses for testing.  But eventually I just looked at it as my contribution to the IT community.  I've never made a dime off this and probably never will.  Though if anyone wants to buy me a beer, you know my PayPal address!  😊

</rant>

-Pete

________________________________
From: UC Penguin <gentoo at ucpenguin.com>
Sent: Friday, December 7, 2018 10:27 AM
To: Pete Brown
Cc: cisco-voip at puck.nether.net
Subject: Re: [cisco-voip] Recovering UCOS Passwords - Round 281

Pete,

Have you given any consideration to open sourcing the UCOS password decoder?

On Dec 6, 2018, at 21:00, Pete Brown <jpb at chykn.com<mailto:jpb at chykn.com>> wrote:

Interesting!  Any documentation on that?  I checked out the release notes for those versions and didn't come across anything pertaining to the remote support passphrase decode version.  Then again, I wouldn't be surprised if they didn't put this specific one in the notes.

If anyone comes across this, please let me know.  If it's just an algorithm change, I imagine it would be Decode Version 4.

________________________________
From: Daniel <daniel at ohnesorge.me<mailto:daniel at ohnesorge.me>>
Sent: Thursday, December 6, 2018 4:32 PM
To: Pete Brown; cisco-voip at puck.nether.net<mailto:cisco-voip at puck.nether.net>
Subject: Re: [cisco-voip] Recovering UCOS Passwords - Round 281


Whatever method you are using to decode the passphrase will be obsolete in versions 10.5(2)su7, 11.5(1)su4 and 12.0(1)su2 (and above) as they are using a new method to decode the passphrase.

On 6/12/18 5:33 am, Pete Brown wrote:
I'm sure some of you noticed, but earlier this year Cisco started releasing patches to kill off the last sanctioned method of getting to platformConfig.xml.  When you run "utils create report platform" on recent versions, it's no longer in the report.  Someone in Boxborough really knows how to put the "cus(s)" in "customers"!

https://quickview.cloudapps.cisco.com/quickview/bug/CSCvh62145<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fquickview.cloudapps.cisco.com%2Fquickview%2Fbug%2FCSCvh62145&data=02%7C01%7C%7C67afcb9175bc48aab06708d65c60d8e0%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636797968356322898&sdata=HI2zmg8xxAKK9%2FiFIwfkdC%2FfRY%2B4byMxYSEMCIMkZuI%3D&reserved=0>

I'm testing a new version of the UCOS Password Decrypter that acquires the file for you.  To use this feature, you enable remote support on your UCOS host then plug in the UCOS host IP, remote support user and remote support passphrase.  The app decodes the passphrase, pulls the file via SSH and displays the passwords.

Need a few volunteers to test before I update the tools page.  If you're interested, let me know.  Would post a temp link here but I don't want yet another dead link floating around.

-Pete



_______________________________________________
cisco-voip mailing list
cisco-voip at puck.nether.net<mailto:cisco-voip at puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-voip<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpuck.nether.net%2Fmailman%2Flistinfo%2Fcisco-voip&data=02%7C01%7C%7C67afcb9175bc48aab06708d65c60d8e0%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636797968356322898&sdata=sVo2tzseSSux%2Fo%2FHkZadwSWRNn5JfFY16PxTjutYm4I%3D&reserved=0>


_______________________________________________
cisco-voip mailing list
cisco-voip at puck.nether.net<mailto:cisco-voip at puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-voip<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpuck.nether.net%2Fmailman%2Flistinfo%2Fcisco-voip&data=02%7C01%7C%7C67afcb9175bc48aab06708d65c60d8e0%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636797968356322898&sdata=sVo2tzseSSux%2Fo%2FHkZadwSWRNn5JfFY16PxTjutYm4I%3D&reserved=0>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20181210/2c5ee88f/attachment.html>


More information about the cisco-voip mailing list