[j-nsp] Unscramble authentication-key

Eric Van Tol eric at atlantech.net
Mon Apr 19 11:28:30 EDT 2004


An aside to this is, if the remote end is a Cisco, there are tools out
there that can easily decode their encryption strings.  SolarWinds
(www.solarwinds.net) makes a tool that can decode the Cisco strings.  It
cannot do MD5, though, so you may be out of luck if the remote end is
not a Cisco.

evt

-----Original Message-----
From: Jared Mauch [mailto:jared at puck.nether.net] 
Sent: Monday, April 19, 2004 4:24 AM
To: Robert Kiessling
Cc: juniper-nsp at puck.nether.net
Subject: Re: [j-nsp] Unscramble authentication-key


On Mon, Apr 19, 2004 at 10:15:18AM +0200, Robert Kiessling wrote:
> Hello,
> 
> in order to do a comparison between configured MD5 secrets and a
> database, we need to decode the $9$ scrambeled authentication-keys.
> 
> What's the algorithm for this?

	If the other side is a cisco, it's stored in cleartext in
memory.  you just need to find the location of the tcp tcb in
memory and do "sh mem <address>" and you'll find it not far in
there..

	- jared


-- 
Jared Mauch  | pgp key available via finger from jared at puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only
mine.
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
http://puck.nether.net/mailman/listinfo/juniper-nsp



More information about the juniper-nsp mailing list