Virtualization Adapted Adapting Business Processes for Virtual Infrastrcuture (and vice-versa)


Cracking Cisco Passwords with John the Ripper

Filed under: Uncategorized — Tags: , , , , — iben @ 19:12

InfoSec Survival Guide: Cracking Cisco Passwords with John

John the Ripper

John the Ripper 1.7.2 for G4 PowerPC, G5 PowerPC and Intel Macs (Universal Binary) (released 11/30/07)

Download the pre-patched (for OS X salted SHA1 hashes too) pre-compiled version of John the Ripper here:

Unzip the archive.

Open Terminal.

Drag the file “john” from the folder “run” from within the unzipped “john-1.7.2-macosx-universal” folder to the Terminal window and let go.

Type a space.

Drag the text file containing your hash ( student:078D486A55E9922772C7F6F46113038E4800D6EDF4D31720 ) to the Terminal window and let go.

Click back in the Terminal window and press the return key.
Loaded 1 password hash (Salt SHA1 [salt-sha1])
barlow (student)


how to reset root password on vmware esx classic

Filed under: virtualization — Tags: , , , , , , — iben @ 11:15

Follow these steps if you need to reset the root password on an ESX classic.

Note: Ignore the “quote marks” in the instructions below.

1 – turn on system (if it’s on then reboot it with Ctrl-Alt-Del from console)
2 – when grub appears press the “tab” key
3 – highlight VMware ESX line using the “arrow” keys
4 – press the “e” key
5 – scroll to kernel line using the “arrow” keys
6 – press the “e” key (again, I know!)
7 – press the “end” key to move cursor to end of the kernel line
8 – type the word “single” (using the keys)
9 – press the “b” key to boot the ESX host into single user mode
10 – eventually a “sh-3.2#” root prompt will appear
11 – use the command “passwd” to reset the password
12 – use the command “reboot” to reboot the ESX machine
13 – login to the console or the vic using the new password!

That’s it! I hope this procedure works for you. Your feedback is appreciated.

Morale of this story is:
1 – always protect the physical environment where you ESX host is located.
2 – always secure the Lights Out/Remote Access/IP-KVM/console access to your host.
3 – consider using a GRUB password on your ESX host so as to prevent password resets.

Powered by WordPress