Lab Report
Password Recovery for routers
Let's use the Cisco Packet Tracer simulator to emulate the password of the reset router! Let's first set up the Enable password for this router! Open the router's configuration interface! The command is as follows:
router>enable //into privileged mode router#configure terminal //into global mode router (config) #hostname r-a //the command named to the router
r-a (config) #enable password 123456789 //command to set password
If we forget to enter the privileged mode password, then we will shut down the router and restart! Then press the "Ctrl+break" key to interrupt the router's boot process and enter Rommon mode!
The input command changes the configuration register value to 0x2142, which causes the router to not read the configuration file in NVRAM when it is turned on. Then restart the router!
The command is as follows:
Rommon 1 > Confreg 0x2142 //Change the configuration register value to 0x2142
Rommon 3 > Reset//Restart router
When the router restarts, it will go directly to the setup configuration mode, with "CTRL + C" or "n" ,
exit setup mode! Then we go into the global mode and reset the privileged mode password! If there are other password samples are forgotten, here we can reset together!
The command is as follows:
Router>enable//Enter privileged mode
Router#configure Terminal//Enter global mode
Router (config) #enable password 1234//Reset Password command
Now return the value of the register to normal 0x2102! Then save the router configuration that has changed! Reboot our router and you're done!
The command is as follows:
Router (config) #config-register 0x2102//Register value returned to normal 0x2102
Router (config) #exit//exit Global mode
router#copy running-config startup-config //save changes to router configuration
destination filename  [STARTUP-CONFIG]?&NBSP,
building configuration ...
[ok]
router#reload //restarting the router
This article from "FQR" blog, declined reprint!
Password Recovery for routers