Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
w configuration Using 4880 out of 524288 bytes ! version 12.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname cisco-g ! boot-start-marker boot-end-marker ! enable secret 5 $1$BBEV$ULHPkzk3chHef.rJguyEm. enable password dBkn8sdo ! ! ! no aaa new-model system mtu routing 1500 authentication mac-move permit ip subnet-zero ! ! ! ! crypto pki trustpoint TP-self-signed-1824812032 enrollment selfsigned subject-n
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Friday, June 29th, 2012 at 14:21 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!