During security analysis, experts often deal with default accounts. Particularly, it is very usual for large companies having several hundred systems. That’s why one of the main requirements is to use complex non-dictionary passwords to comply with security standards and best practices.
There are two ways to test the system compliance with this requirement:
password brute-forcing,
obtaining and checking passwords or their hashes from the system.
The former method can cause account lockout and thus is often found unacceptable. The latter one is preferable, but gives another problem if passwords are encrypted or hashed.
Let us consider how passwords are stored in Cisco Wireless LAN Controllers. The configuration file contains usernames and passwords for Cisco WLC in the following form
more here................http://blog.ptsecurity.com/2014/05/obtaining-passwords-from-cisco-wireless.html
There are two ways to test the system compliance with this requirement:
password brute-forcing,
obtaining and checking passwords or their hashes from the system.
The former method can cause account lockout and thus is often found unacceptable. The latter one is preferable, but gives another problem if passwords are encrypted or hashed.
Let us consider how passwords are stored in Cisco Wireless LAN Controllers. The configuration file contains usernames and passwords for Cisco WLC in the following form
more here................http://blog.ptsecurity.com/2014/05/obtaining-passwords-from-cisco-wireless.html