8.1. cisco passwords

nettoolkit.pyNetCrypt.cpw_cracker.decrypt_file_passwords(input_file, output_file)[source]

Decrypts all type 7 passwords found in input file, and create a new updated output file with plain text passwords

Parameters:
  • input_file (str) – cisco configuration file name

  • output_file (str) – output file name

nettoolkit.pyNetCrypt.cpw_cracker.decrypt_type7(ep)[source]

Cisco type-7 password decryptor

nettoolkit.pyNetCrypt.cpw_cracker.encrypt_type7(pt)[source]

Cisco type-7 password encryptor

nettoolkit.pyNetCrypt.cpw_cracker.mask_file_passwords(input_file, output_file)[source]

Masks all type 7 and type 9 passwords found in cisco configuration input file, and creates a new updated output file with plain masked passwords

Parameters:
  • input_file (str) – cisco configuration file name

  • output_file (str) – output file name

8.2. juniper passwords

nettoolkit.pyNetCrypt.jpw_cracker.decrypt_doller9_file_passwords(input_file, output_file)[source]

Decrypts all $9$ passwords found in input file, and create a new updated output file with plain text passwords

Parameters:
  • input_file (str) – juniper configuration file name

  • output_file (str) – output file name

nettoolkit.pyNetCrypt.jpw_cracker.juniper_decrypt(crypt)[source]

Juniper $9$ password decryptor

nettoolkit.pyNetCrypt.jpw_cracker.juniper_encrypt(plaintext, salt=None)[source]

Juniper $9$ password encryptor

nettoolkit.pyNetCrypt.jpw_cracker.mask_doller9_file_passwords(input_file, output_file)[source]

Masks all $9$ passwords found in juniper configuration input file, and creates a new updated output file with plain masked passwords

Parameters:
  • input_file (str) – juniper configuration file name

  • output_file (str) – output file name

8.3. md5 calculate

nettoolkit.pyNetCrypt.generate.get_md5(file)[source]

create and return md5 hash for given file

Parameters:

file (str) – input file

Returns:

MD5 hash value

Return type:

str