I was trying to get into admin mode without the enable password during a penetration test and i came across a post by Terry where he describes a designing flaw in the PIX/ASA Finesse Operation System, version 7.1 and 7.2. Well, it was possible to escalate a normal level 0 user to a level 15 privilege user. The exploit is simple and it only works locally, at the console and remotely with Telnet. However, do note that it will NOT work if SSH, TACACS or Radius is implemented in the firewall. Below are the steps.
1. Login with your user level 0 account. Once logon, you will be prompted to enter the enable password which is the privilege password.
2. At this prompt if you move your cursor forward with a space or character(it doesn't matter if there are more then one), and then proceed to delete any spaces or characters, by holding down the backspace a second after deleting the last character it should immediately drop you into level 15 privilege-exec mode.
It had been tested on PIX 515E, Finesse version 7.2 and i had also tested it on the PIX 525.
The Hacka Man
1. Login with your user level 0 account. Once logon, you will be prompted to enter the enable password which is the privilege password.
2. At this prompt if you move your cursor forward with a space or character(it doesn't matter if there are more then one), and then proceed to delete any spaces or characters, by holding down the backspace a second after deleting the last character it should immediately drop you into level 15 privilege-exec mode.
It had been tested on PIX 515E, Finesse version 7.2 and i had also tested it on the PIX 525.
The Hacka Man







If you read Colin Percival's blog you will notice he posted a message about 


In 

About a month ago I recorded a podcast for 
I received the following question from a blog reader. I am interested in hearing what you think.



I just wanted to remind interested readers that