Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Norstar config password reset 1

Status
Not open for further replies.

ringbacktone

Technical User
Jan 9, 2009
107
US
I have a site that has the **266344 password changed to some unknown passcode.
Can not say I have ever needed to know how to reset it to default till now and have no idea where to start.

Any help from the forum is greatly appreciated.

Thanks in advance,

RBT
 
I am the vendor for this site and was on site this morning attempting to reset **config password using the web browser. There was no useful info for this reset in the FAQ of this forum.
My initial plan was to use the advice which Exmogger offered up. Thanks, Exmogger for the input. You more or less verified my thoughts. When I arrived on site and connected laptop to RAD I was able to enter program mode emulating the telephone, however, not knowing the reset password, could not make changes. When I used browser I received error message telling me the software (MICS T1)
was not compatible with NRU 11.

Tossed it back to customer and offered to default MICS and VM and
reprogram it.

If I learn more I will add to this post to share this data.

Thanks,

RBT
 
Thanks for the input. At this stage I think customer will probably
have me perform a reboot/cold start.8 lines 15 sets and 10 mailboxes
can't take but just so long. Everything works correctly, new manager has issues with 7 character name display on sets.

Have a great day,

RBT
 
I figured I would need to power down and pull software cartridge restart it. I think that system age will cause it to restart, however, you make a good point. Perhaps I should have an old 2.0 cartridge on hand in case my plan does not pan out.
Thanks, at least I have a plan B.

Have a great day,

RBT
 
I recently had to do this on a MICS 4.1 system.

Doing it with the debug process was not too hard and the system gave up it's password without much trouble.
This only works if one of the lower level passwords is known and you can change the date.

Yet another walkthrough of how to do it
Change the date to Feb 1, 91
Enter Debug Dial Feature **DEBUG
Use the daily code for Feb 1 91 which was 144900
Go to memory dump
Enter the address C01CC6 to show. This memory location is going to be a bit different depending on the version of software and type of system you are running but if the system coordinator password is known it will show up in the memory right after the installer password that you want to find so searching through memory isn't too hard. The memory location should not be too far ahead or behind the values you find in the debug FAQ unless Nortel completely rewrote the software in later versions and the memory location have moved radically or they hash the password in memory in later versions.

Memory dump is in ASCII Hex so every character is represented as 2 "digits".
You will need to scroll through the memory to read the complete code as the display can only show 4 characters of ASCII hex codes at a time (8 digits on the display)

For example the memory dump here is starting at the exact position at the beginning of the installer password (you may not be so lucky to know exactly the correct memory location).
0606 0603 (code would be 6663)
0902 0203 (code would be 9223)
0604 060f (code would be 646 with a null character at the end)

Default system coordinator password is ADMIN which is the digits 23646. You can see that password appear in this dump just before the 0f which represents the end of the sequence. Just before this you see:
0203
0604 06 Which if you stick it back together is 0203060406 convert back from HEX gives 23646 (ADMIN).
Just before the known password is the unknown installer password we were looking for. In this example it's 0606 0603 09 which is 66639. We have the installer password and can now exit out of debug mode.

Go into configuration with the recovered password and change the date back and you can reconfigure as you like without having to clear the system configuration from memory. No need for a compatible RAD and remote utilities, etc.

It's not going to work unless you know the password for some level of access since you need to change the date back and it also helps you to search for the known password in memory unless the version of your Norstar equipment has the memory address for the password published in the FAQ or elsewhere so you can jump directly to it.


 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top