Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
gorii ! version 15.1 service timestamps debug datetime localtime service timestamps log datetime localtime no service password-encryption ! hostname Border ! boot-start-marker boot-end-marker ! ! logging buffered 100000 logging rate-limit 5 enable secret 5 $1$/./.$bGxjfJS.NA5SzE2KF9UtY1 ! no aaa new-model clock timezone ESS 6 0 ! no ipv6 cef ip source-route ip cef ! ! ! ! ! ip domain name bashedu.ru ip name-server 220.127.116.11 multilink bundle-name authenticated ! ! crypto pki to
This entry was posted on Thursday, June 28th, 2012 at 09:35 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.