Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
HQ-Singapore#show run Building configuration... Current configuration : 1232 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname HQ-Singapore ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU.ZeCi1 ! ! ! ! ! ! username Branch-China password 0 class ! ! ! ! ! ! ! ! ! ! ! interface FastEthernet0/0 ip address 126.96.36.199 255.255.254.0 duplex auto speed auto ! interface FastEthernet1/0 ip ad
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Thursday, June 14th, 2012 at 18:41 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!