After swapping out a production web server, we noticed two rogue services on the server. These were ftp servers running under other names(dns server and dhcp server). We've been able to locate some of the config files for one of the ftp servers and would like to log in and see what the servers were providing access to. We do have the user names and password hashes, but unfortunately have been as of yet unable to decrypt them. We believe that these are md5 hashes. Following are a few lines from the config file:
LocalSetupPassword=072C63105200180D5C07170A7E3E
Password=wqAF6FBA47A94049C0D2C7CD54FA4DCD0C
[USER=MoMo|1]
Password=zm64E7F688C6D152C52EBF43EB4A0E9F5C
[USER=Alex|1]
Password=ztEE5F10002D07556C092037A66A2AE9F1
[USER=Chenli|1]
Password=qrC15CAD43367D7A38617CB399E30093DF
[USER=DNS|1]
Password=koA98B03814A6858A7601552D6A7AAA648
[USER=Eclipse|1]
Password=zi24A56515D6B703647BD7DDCB5DDDDDA2
[USER=Nice|1]
Password=quD4421B1C59B504C3E861E832F3D24385
Any help you could provide would be greatly appreciated.
Thanks in advance,
GD
LocalSetupPassword=072C63105200180D5C07170A7E3E
Password=wqAF6FBA47A94049C0D2C7CD54FA4DCD0C
[USER=MoMo|1]
Password=zm64E7F688C6D152C52EBF43EB4A0E9F5C
[USER=Alex|1]
Password=ztEE5F10002D07556C092037A66A2AE9F1
[USER=Chenli|1]
Password=qrC15CAD43367D7A38617CB399E30093DF
[USER=DNS|1]
Password=koA98B03814A6858A7601552D6A7AAA648
[USER=Eclipse|1]
Password=zi24A56515D6B703647BD7DDCB5DDDDDA2
[USER=Nice|1]
Password=quD4421B1C59B504C3E861E832F3D24385
Any help you could provide would be greatly appreciated.
Thanks in advance,
GD