Chinaunix首页 | 论坛 | 博客
  • 博客访问: 12745
  • 博文数量: 10
  • 博客积分: 1400
  • 博客等级: 上尉
  • 技术积分: 140
  • 用 户 组: 普通用户
  • 注册时间: 2009-01-16 17:01
文章分类
文章存档

2011年(1)

2009年(9)

我的朋友
最近访客

分类: LINUX

2009-03-12 17:39:17

When you look at the enable secret in a Cisco router configuration, it looks like it would be impossible to guess. After setting the enable secret on this router to the word security, here’s how it appears in the :

enable secret 5 $1$24me$gVFxUOI4gYp0IQbhtH8Rz0

That password has been encrypted by MD5, the Message Digest 5 algorithm. The result of the MD5 algorithm being applied to the password is a 32-character hexadecimal value.

That password is hard to guess, but not terribly hard to crack. Anyone looking over your shoulder would not be able to come up with that password, but there are readily-available password cracking software devices that can crack that encryption in a matter of minutes. That’s true of any MD5-encrypted password, not just those on  .

So what can we do about this? We can add SALT to our MD5.

The salt itself is simply a string of random characters that are added to the encryption process. Salting makes it much more difficult for a hacker to come up with the password; each bit added by the salt process literally makes it twice as difficult for the password to be compromised. A recent Wikipedia entry states that if a password was one of 200,000 words, a 32-bit salt would require 800 trillion hashes for a full-blown brute force attack.

The actual creation and application of a salt is beyond the scope of the CCNA Security exam, but once you’ve earned that valuable certification - or maybe while you’re preparing for it - do a Google search on “salt md5″ and read up on this powerful security tool. In the meantime, look for more CCNA Security tutorials on the site you’re on now as well as !

Chris Bryant, CCIE #12933, is the owner of The Exam tutorials.

阅读(275) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~