Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
w configuration Using 4880 out of 524288 bytes ! version 12.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname cisco-g ! boot-start-marker boot-end-marker ! enable secret 5 $1$BBEV$ULHPkzk3chHef.rJguyEm. enable password dBkn8sdo ! ! ! no aaa new-model system mtu routing 1500 authentication mac-move permit ip subnet-zero ! ! ! ! crypto pki trustpoint TP-self-signed-1824812032 enrollment selfsigned subject-n
This entry was posted on Friday, June 29th, 2012 at 14:21 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.