Cisco router password recovery

1) Press Break on the terminal keyboard a couple of times after you see the message program load complete, entry point: 0x80008000, size: 0x6fdb4c in order to put the router into ROMMON.

2) Type confreg 0x2142 at the rommon 1> prompt in order to boot from Flash.

This step bypasses the startup configuration where the passwords are stored.

3) Type reset at the rommon 2> prompt.

The router reboots, but ignores the saved configuration.

4) Type no after each setup question, or press Ctrl-C in order to skip the initial setup procedure.

5) Type enable at the Router> prompt.

You are in enable mode and should see the Router# prompt.

6) Type configure memory  or copy startup-config running-config in order to copy the nonvolatile RAM (NVRAM) into memory.

7) Type show running-config.

The passwords (enable password, enable secret, vty, and console passwords) are in either an encrypted or encrypted format. You can reuse ir change.

8) Type configure terminal.

The hostname (config) # prompt appears.

9) Type enable secret in order to change the enable secret password. For example:

hostname (config)#enable secret cisco

10) Type config-register. Where configuration_register_setting is either the value you recorded in step 2 or 0x2102. For example:

hostname(config)#config-register 0x2102

11) Press Ctrl-z or end in order to leave the configuration mode.

The hostname# prompt appears.

12) Type write memory or copy running-config startup-config in order to commit the change


That's it

Comentários

Postagens mais visitadas deste blog