Cisco switch password cracking

I am getting older and always forget the cisco switch password. Now I record the two big steps and 13 small steps of initializing the cisco switch password as follows.

A:

1. Open the SecureCRT software in the computer (or download the windows7 HyperTerminal v1.01 green version\hypertrm.exe), set the port (COM3) and Baud rate (baud rate: 9600) and plug in the console line.

2. Unplug the power supply of the switch.

3. Hold down the MODE button on the switch with your hands, and then plug in the power supply.

4. After about 40-50 seconds, release the mode button. At this time, the switch has entered the bottom configuration mode. After you see the ROM status of the switch in the console (the prompt is switch: as shown below), release the MODE button.

5. Execute the flash_init command after switch: to initialize the flash (as shown in the figure below).

6. The command to view the configuration file in Flash: dir flash:/

7. Rename the config.text file to config.old or other (as shown below). Command: switch: rename flash:config.text flash:config.old

8. Execute the boot command to restart the switch switch: boot (as shown in the figure below).

 

B:

9. When the switch appears whether to enter the configuration, select no twice

10. Enter the privileged mode to view the configuration file in the flash (as shown in the figure below). Command: switch# show flash

11. Change config.old back to config.text (as shown below). Command: switch# rename flash:config.old flash:config.text

12. Copy config.text into the system to overwrite the current configuration (that is, running-config): switch# copy flash:config.textsystem:running-config (as shown in the figure below).

13. After entering the global configuration and setting the enable password and saving it, you can log in with the new password. switch(config)# enable secret cisco

Of course, you can also reset the vty and console passwords.






Guess you like

Origin blog.csdn.net/boy_hxm/article/details/79240993