• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Breaking into a 3Com CoreBuilder 9400

Halz

Senior member
I have one these fine 24 port fiber switching units sitting on my desk at home. The valid accounts I know of are 'administer', 'read', 'write' and I think even 'debug' (I can get a password prompt for just about any other account I can think of.. 'aaaaaa', 'hello', 'whatever'.. So one avenue of brute force is already lost.. The passwords for 'read' and 'write' were left blank, so I have a small degree of usability. Using the known account 'administer', I would expect the most straight forward procedure to be a brute force..

I'm at a loss here... Talking with the 3Com support, they suggest there is nothing more I can do than send the unit in for service for $1900. I have gone as far as removing the ROM chip on the PCB, waiting over night, and replacing it. However, that puts me back to square one.

I have a .bin file for writing over the ROM, if I could just figure out how to write directly *to* the ROM following the correct memory addressing scheme..

Any other ideas on how to recover/purge the password?
 
Back
Top