All process of cracking vswitch password locations

Source: Internet
Author: User

Both the vswitch and the vro must have a certain degree of security. That is to say, they must be configured with a reasonable password in a timely manner. What should we do if this password is forgotten? I have met this time. Due to job transfer, the former network administrator left the department, but set a password on the switch, and did not tell me the network administrator who took over. What should we do? Sending it back to the vendor for cracking is too troublesome. So I personally went through the password cracking process.

I. Network Environment:

The company uses a 3500 series vswitch (with a specific model of 3548) to connect a Huawei 2621 vro to the vswitch and access the Internet through optical fiber cables of China Telecom. The actual situation is that the vswitch 3548 was set by the previous network administrator and didn't tell me. Therefore, cracking the password becomes the core of this article.

2. preparations:

Because the entire work needs to be disconnected, after all, operations such as restarting the switch are involved, so the time is am after work. In addition, because password cracking and other such operations must be set using the CONSOLE line, the location can only be a central data center. I have found all the tools related to devices up to 3548, including installation instructions and CONSOLE control lines.

Iii. Actual password cracking:

According to my previous experience, the usage and Operation Command statements of all devices should be similar to those of CISCO devices. Therefore, I thought it would be easy to crack the password of CISCO devices. Who knows the difference is not small. Generally, CISCO devices use the configuration register to crack passwords. The configuration register does not exist in the real-time switch. After querying the information, we found that the real-time switch used to modify the Super Terminal Configuration to crack the password.

Step 1: connect the CONSOLE control line of the real-time switch to the CONSOLE management interface of the device.

Step 2: disconnect another line of control on the CONSOLE to the COM serial port of the notebook used for debugging by the network administrator.

Step 3: Go to the desktop of the notebook system and click Start> All Programs> accessories> communication> Super Terminal ".

Step 4: after starting the Super Terminal of the system, we can name the new connection.

Step 5: select the port that you just connected to using the CONSOLE control line from the drop-down menu in the "use during connection" Area of the connection settings. For example, COM1 port.

Step 6: In the COM1 property settings window, configure the connection parameters. Generally, we normally connect to a vswitch using 9600 bits per second, 8 data bits, no parity check, 1 Stop bits, and no data flow control. However, if you want to crack the password of a real-time switch, you need to modify these values. Set the serial port speed of the PC Super Terminal to 57600, and set the speed to the same as that written above.

Step 7: Use the terminal to connect to the vswitch, and then turn on the power of the vswitch. After the vswitch is started, immediately press the "ESC" Key multiple times to enter the monitoring mode of the vswitch. Multiple options are displayed on the terminal interface, including some basic initialization settings.

TIPS:

At the beginning, I tried Step 7 and did not succeed. The Super Terminal interface always displays many "...". Later, it was discovered that the switch had to be connected to the Super Terminal before it could be powered on. If the switch was first connected to the Super Terminal, it would not be able to enter the monitoring mode.

Step 8: Upload the configuration file config. text (Upload) to the notebook used by the network administrator according to the menu prompt, and then delete the configuration file Config. text on the switch.

Step 9: Open the downloaded config. text file in the system hard disk in the notebook and run the following statement:

Enable secret level 1 5! E, 1u _; C9 &-8U0H

Enable secret level 15 5 * r_1u _; C3vW8U0H

Delete and save and exit.

Step 10: Download the modified config. text in the notebook to the switch according to the prompt in the switch monitoring mode.

Step 2: Set the serial port speed of the Super Terminal of the notebook to 11th again, and keep the default parameters for others. After the vswitch is powered on and restarted, you can go to the vswitch configuration page and find that you can reconfigure the vswitch password, including the management password for remote TELNET and the privilege password of the local machine. After that, the switch password will be changed to the one you just configured, while other configurations will remain unchanged and will not affect any usage.

TIPS:

In actual use, I found that the upload and download functions in the monitoring mode of the 3550 switch are not stable, and the transmission failure is often prompted. Therefore, the author simply deletes config. text in monitoring mode, and then restarts the switch to reconfigure all the switch information. This situation applies to the fact that the vswitch does not have many configurations and is not complex. In addition, the network administrator must be familiar with the setting statements.

Summary:

After the actual operation of cracking the switch password, the author once again understands that for the routing switch device, the operating procedures and steps of different vendors are absolutely different, even if the command statements are similar, they are quite different in other advanced operations. Therefore, all the content introduced in this article is only for real-time routers and switches. If you encounter other devices, you need to use other methods to solve them.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.