Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’:
ExpressSetup_SHOW_RUN" value=" Building configuration... Current configuration : 1361 bytes ! version 12.4 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname ap ! enable secret 5 $1$OpUo$7RpK02gI7cMfAWoEaeyu./ ! no aaa new-model ! ! power inline negotiation prestandard source ! ! username Cisco password 7 05280F1C2243 ! bridge irb ! ! interface Dot11Radio0 no ip address no ip route-cache shutdown station-rol
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Saturday, July 7th, 2012 at 07:30 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!