Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
gorii ! version 15.1 service timestamps debug datetime localtime service timestamps log datetime localtime no service password-encryption ! hostname Border ! boot-start-marker boot-end-marker ! ! logging buffered 100000 logging rate-limit 5 enable secret 5 $1$/./.$bGxjfJS.NA5SzE2KF9UtY1 ! no aaa new-model clock timezone ESS 6 0 ! no ipv6 cef ip source-route ip cef ! ! ! ! ! ip domain name bashedu.ru ip name-server 126.96.36.199 multilink bundle-name authenticated ! ! crypto pki to
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Thursday, June 28th, 2012 at 09:35 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!