Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
sword: KTAK#sh run Building configuration... Current configuration : 2594 bytes ! version 12.3 service timestamps debug uptime service timestamps log uptime service password-encryption ! hostname KTAK ! boot-start-marker boot-end-marker ! enable secret 5 xx ! no network-clock-participate aim 0 no network-clock-participate aim 1 no aaa new-model ip subnet-zero ! ! ip cef ! ! ip domain name tm.net.my ip name-server 126.96.36.199 ip name-server 188.8.131.52 no ftp-server write-enable
This entry was posted on Thursday, June 14th, 2012 at 09:10 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.