2012-04-09 07:55 ASA5510恢复密码在网上找到这段

Step 1  Connect to the security appliance console port according to the

Step 2  Power off the security appliance, and then power it on.
Step 3  During the startup messages, press the Escape key when prompted to enter ROMMON.
Step 4  To set the security appliance to ignore the startup configuration at reload, enter the following command:
     rommon #1> confreg
     The security appliance displays the current configuration register value, and asks if       you want to change the value:
     Current Configuration Register: 0x00000011
     Configuration Summary:
     boot TFTP image, boot default image from Flash on netboot failure
     Do you wish to change this configuration? y/n [n]:
Step 5  Record your current configuration register value, so you can restore it later.
Step 6  At the prompt, enter Y to change the value.
     The security appliance prompts you for new values.
Step 7  Accept the default values for all settings, except for the “disable system      configuration?” value; at that prompt, enter Y.
Step 8  Reload the security appliance by entering the following command:
     rommon #2> boot
     The security appliance loads a default configuration instead of the startup     configuration.
Step 9  Enter privileged EXEC mode by entering the following command:
     hostname> enable
Step 10  When prompted for the password, press Return.
     The password is blank.
Step 11  Load the startup configuration by entering the following command:
     hostname# copy startup-config running-config
Step 12  Enter global configuration mode by entering the following command:
     hostname# configure terminal
Step 13  Change the passwords in the configuration by entering the following commands, as      necessary:
     hostname(config)# password password
     hostname(config)# enable password password
     hostname(config)# username name password password
Step 14  Change the configuration register to load the startup configuration at the next reload      by entering the following command:
     hostname(config)# config-register value
     Where value is the configuration register value you noted in Step 5. 0x1 is the default      configuration register. For more information about the configuration register, see the      Cisco Security Appliance Command Reference.
Step 15  Save the new passwords to the startup configuration by entering the following command:
      hostname(config)# copy running-config startup-config

我的具体做法如下:

Booting system, please wait…

########此时按ESC键

CISCO SYSTEMS

Embedded BIOS Version 1.0(11)5 08/28/08 15:11:51.82

Low Memory: 631 KB

High Memory: 1024 MB

PCI Device Table.

Bus Dev Func VendID DevID Class Irq

00 00 00 8086 2578 Host Bridge

00 01 00 8086 2579 PCI-to-PCI Bridge

00 03 00 8086 257B PCI-to-PCI Bridge

00 1C 00 8086 25AE PCI-to-PCI Bridge

00 1D 00 8086 25A9 Serial Bus 11

00 1D 01 8086 25AA Serial Bus 10

00 1D 04 8086 25AB System

00 1D 05 8086 25AC IRQ Controller

00 1D 07 8086 25AD Serial Bus 9

00 1E 00 8086 244E PCI-to-PCI Bridge

00 1F 00 8086 25A1 ISA Bridge

00 1F 02 8086 25A3 IDE Controller 11

00 1F 03 8086 25A4 Serial Bus 5

00 1F 05 8086 25A6 Audio 5

02 01 00 8086 1075 Ethernet 11

03 01 00 177D 0003 Encrypt/Decrypt 9

03 02 00 8086 1079 Ethernet 9

03 02 01 8086 1079 Ethernet 9

03 03 00 8086 1079 Ethernet 9

03 03 01 8086 1079 Ethernet 9

04 02 00 8086 1209 Ethernet 11

04 03 00 8086 1209 Ethernet 5

Evaluating BIOS Options …

Invalid Key: 001B

Launch BIOS Extension to setup ROMMON

Cisco Systems ROMMON Version (1.0(11)5) #0: Thu Aug 28 15:23:50 PDT 2008

Platform ASA5510

Management0/0

Ethernet auto negotiation timed out.

Interface-4 Link Not Established (check cable).

Default Interface number-4 Not Up

Use ? for help.

rommon #0> confreg

Current Configuration Register: 0x00002000

Configuration Summary:

boot ROMMON

load ROMMON if netboot fails

Do you wish to change this configuration? y/n [n]:y

enable boot to ROMMON prompt? y/n [n]:y

select specific Flash image index? y/n [n]: y

enter Flash image index [1->7]: 1 #此处我没有弄懂什么意思

disable system configuration? y/n [n]: y

go to ROMMON prompt if netboot fails? y/n [n]:y

enable passing NVRAM file specs in auto-boot mode? y/n [n]:y

disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:y

Current Configuration Register: 0x00112042

Configuration Summary:

boot ROMMON, boot command will load index-1 image from Flash

ignore system configuration

load ROMMON if netboot fails

pass NVRAM file specs in auto-bootloader mode

display of BREAK or ESC key prompt during auto-boot disabled

Update Config Register (0x112042) in NVRAM…

rommon #1>boot

Launching BootLoader…

Default configuration file contains 1 entry.

Boot mode is 1. Default entry is 1.

Searching / for images to boot.

Loading /asa842-k8.bin… Booting…

Platform ASA5510

Loading…

IO memory blocks requested from bigphys 32bit: 13008

dosfsck 2.11, 12 Mar 2005, FAT32, LFN

Starting check/repair pass.

Starting verification pass.

/dev/hda1: 134 files, 6278/62462 clusters

dosfsck(/dev/hda1) returned 0

Processor memory 868220928, Reserved memory: 62914560

Total SSMs found: 0

Total NICs found: 7

mcwa i82557 Ethernet at irq 11 MAC: 5475.d0d4.9506

mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001

i82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002

i82546GB rev03 Ethernet @ irq09 dev 2 index 03 MAC: 5475.d0d4.9505

i82546GB rev03 Ethernet @ irq09 dev 2 index 02 MAC: 5475.d0d4.9504

i82546GB rev03 Ethernet @ irq09 dev 3 index 01 MAC: 5475.d0d4.9503

i82546GB rev03 Ethernet @ irq09 dev 3 index 00 MAC: 5475.d0d4.9502

Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)

                         Boot microcode        : CN1000-MC-BOOT-2.00 SSL/IKE microcode     : CNLite-MC-SSLm-PLUS-2.03IPSec microcode       : CNlite-MC-IPSECm-MAIN-2.06

Verify the activation-key, it might take a while…

Running Permanent Activation Key: 0xe30ae376 0x68468285 0x04808d74 0xac70ec70 0x070600aa

Licensed features for this platform:

Maximum Physical Interfaces : Unlimited perpetual

Maximum VLANs : 50 perpetual

Inside Hosts : Unlimited perpetual

Failover : Disabled perpetual

VPN-DES : Enabled perpetual

VPN-3DES-AES : Enabled perpetual

Security Contexts : 0 perpetual

GTP/GPRS : Disabled perpetual

AnyConnect Premium Peers : 2 perpetual

AnyConnect Essentials : Disabled perpetual

Other VPN Peers : 250 perpetual

Total VPN Peers : 250 perpetual

Shared License : Disabled perpetual

AnyConnect for Mobile : Disabled perpetual

AnyConnect for Cisco VPN Phone : Disabled perpetual

Advanced Endpoint Assessment : Disabled perpetual

UC Phone Proxy Sessions : 2 perpetual

Total UC Proxy Sessions : 2 perpetual

Botnet Traffic Filter : Disabled perpetual

Intercompany Media Engine : Disabled perpetual

This platform has a Base license.

Cisco Adaptive Security Appliance Software Version 8.4(2)

****************************** Warning *******************************

This product contains cryptographic features and is

subject to United States and local country laws

governing, import, export, transfer, and use.

Delivery of Cisco cryptographic products does not

imply third-party authority to import, export,

distribute, or use encryption. Importers, exporters,

distributors and users are responsible for compliance

with U.S. and local country laws. By using this

product you agree to comply with applicable laws and

regulations. If you are unable to comply with U.S.

and local laws, return the enclosed items immediately.

A summary of U.S. laws governing Cisco cryptographic

products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by

sending email to export@cisco.com.

******************************* Warning *******************************

Copyright © 1996-2011 by Cisco Systems, Inc.

            Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

© of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

© (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

            Cisco Systems, Inc.170 West Tasman DriveSan Jose, California 95134-1706

Ignoring startup configuration as instructed by configuration register.

INFO: MIGRATION - Saving the startup errors to file ‘flash:upgrade_startup_errors_201204081335.log’

Type help or ‘?’ for a list of available commands.

ciscoasa> en

Password: #此处直接回车

ciscoasa#

ciscoasa#copy startup-config running-config

Destination filename [running-config]?#直接回车 con

%Error opening system:con (No such file or directory)

ciscoasa# copy startup-config running-config

Destination filename [running-config]? configure terminal

%Error opening system:configure (No such file or directory)

ciscoasa# copy startup-config running-config

Destination filename [running-config]? y

%Error opening system:y (No such file or directory)

ciscoasa# copy ?

/noconfirm Do not prompt for confirmation

/pcap Raw packet capture dump

capture: Copyout capture buffer

disk0: Copy from disk0: file system

disk1: Copy from disk1: file system

flash: Copy from flash: file system

ftp: Copy from ftp: file system

http: Copy from http: file system

https: Copy from https: file system

running-config Copy from current system configuration

smb: Copy from smb: file system

startup-config Copy from startup configuration

system: Copy from system: file system

tftp: Copy from tftp: file system

ciscoasa# copy str

ciscoasa# copy sta

ciscoasa# copy startup-config ru

ciscoasa# copy startup-config running-config

Destination filename [running-config]? ?

Cryptochecksum (unchanged): 2e44c71d a824ed25 7a3273d9 e8a3e089

5026 bytes copied in 0.270 secs

ciscoasa# copy startup-config running-config

Destination filename [running-config]?

WARNING: found duplicate element

WARNING: <101> found duplicate element

…WARNING: Policy map global_policy is already configured as a service policy

Cryptochecksum (unchanged): 2e44c71d a824ed25 7a3273d9 e8a3e089

5026 bytes copied in 0.190 secs

ciscoasa# con

ciscoasa# configure te

ciscoasa#configure terminal

ciscoasa(config)# pas

ciscoasa(config)# passw?

configure mode commands/options:

passwd password

ciscoasa(config)# passwo

ciscoasa(config)# password wxlccsu

ciscoasa(config)# en

ciscoasa(config)# ena

ciscoasa(config)# enable pa

ciscoasa(config)# enable password pa

ciscoasa(config)#enable password wxlccsu

ciscoasa(config)# con

ciscoasa(config)# conf

ciscoasa(config)# config-

ciscoasa(config)# config-register

ciscoasa(config)# config-register 0x01 #此处如果没有改的话就是0X01

ciscoasa(config)# co

ciscoasa(config)# cop

ciscoasa(config)# copy ru

ciscoasa(config)# copy running-config sta

ciscoasa(config)# copy running-config startup-config

Source filename [running-config]? ####此处直接回车

Cryptochecksum: b06d7497 13c8a9ce f9c4a96e 6bfc157a

5481 bytes copied in 3.290 secs (1827 bytes/sec)

ciscoasa(config)# end

ciscoasa# reboot

ASA5510 Password recovery相关推荐

  1. Network Password Recovery工具查看windows凭据密码

    你好,我是悦创. 公司密码太严,不能查看登录怎么办? 查看 windows 凭据密码 方法一: 使用重装系统工具里面自带的修改密码工具来修改或者清除密码. 方法二: 查看 windows 凭据密码,这 ...

  2. Advanced Archive Password Recovery下载

    分享一下我老师大神的人工智能教程!零基础,通俗易懂!http://blog.csdn.net/jiangjunshow 也欢迎大家转载本篇文章.分享知识,造福人民,实现我们中华民族伟大复兴! 下载地址 ...

  3. Advanced Zip Password Recovery下载

    ** Advanced Zip Password Recovery下载 ** 百度网盘 链接:https://pan.baidu.com/s/1csNn4LSrvF_sGQ-w_-1nNA 提取码:1 ...

  4. Advanced Archive Password Recovery

    今天给大家分享一款文件破解密码的工具:Advanced Archive Password Recovery 我录了教程,大家可以看看,我给大家提醒一下: 视频展示破解的是数字密码,其实也可以是混合密码 ...

  5. 破解RAR压缩包密码——RAR Password Recovery Magic 6.1.1.95 绿色汉化版

    破解RAR压缩包密码--RAR Password Recovery Magic 6.1.1.95 绿色汉化版 有时候我们忘记了自己的一些加密压缩的RAR文档的密码,有时候上网下载的一些RAR文档加了密 ...

  6. Network Password Recovery工具查看windows凭据隐藏密码

    查看windows凭据密码 方法一: 使用重装系统工具里面自带的修改密码工具来修改或者清除密码. 方法二: 查看windows凭据密码,这里居然看不了 需要用到 nirsoft 公司做的免费工具 Ne ...

  7. Resetting a lost Admin password

    Resetting a lost Admin password 来源 https://cookbook.fortinet.com/resetting-a-lost-admin-password/ Po ...

  8. Dump Windows password hashes efficiently

    link:http://brk.dis9.com/dump-windows-password-hashes-efficiently.html Slightly modified definition ...

  9. 如何破解压缩文件密码-省时省力的方法

    压缩文件破解工具下载地址:http://www.cnblogs.com/spring_wang/archive/2013/06/14/3135163.html 应该很多人都碰到过RAR加密.解密的问题 ...

最新文章

  1. [python] 3 、基于串口通信的嵌入式设备上位机自动测试程序框架(简陋框架)...
  2. 读取pandas修改单列数据类型
  3. Zookeeper集群的搭建及遇到的问题
  4. SessionStorage 和 LocalStorage 生命周期 以及 浏览器刷新操作意味着什么?
  5. 跟踪异常–第4部分– Spring的邮件发件人
  6. 仿星球大战个人引导页源码
  7. 力扣77.组合(JavaScript)
  8. SpringMVC Java config freemarker
  9. CSS表单元素样式设置
  10. Android多媒体:AudioTrack
  11. SQLServer2016安装教程
  12. 明小子动力上传拿webshell.zip
  13. OA系统高性能解决方案(史上最全的通达OA系统优化方案)
  14. java实现Stripe信用卡支付
  15. web网页设计实例作业 ——古典中国风工艺美术(9页) html+css+javascript网页设计实例
  16. memcpy 内存越界分析
  17. 数据库常见问题汇总Subquery returns more than 1 row
  18. 批处理注销计算机当前用户名,批处理实现重起和注销的指令是什么?
  19. 汽车软件开发:目前还存在几大方面的痛点亟待解决?
  20. bilibili视频av号的查找

热门文章

  1. wxpython制作eml文件阅读器
  2. C语言判断关系中的自反还是反自反
  3. 原神剧情自动对话增强版
  4. 利用ffmpeg+QSV进行视频处理
  5. 徐妈说,他常常因为不太会 Linux 而感到难过
  6. python爬虫——request模块讲解
  7. C# ActiveX开发打印机控件
  8. linux鼠标垫,说好的鼠标垫评测……布面,底面材质,评测中谈谈我对鼠标垫的看法...
  9. Flutter学习资料集合(开发必备)
  10. 2021年起重机司机(限桥式起重机)证考试及起重机司机(限桥式起重机)实操考试视频