These are some messages I scraped off the internet. You can also try using SNMP with a brute force cracker for the SNMP string.. assuming it's enabled
Mike S
There appears to be a backdoor/undocumented "access level" in current (and
possibly previous) versions of 3Com's "intelligent" and "extended"
switching software for LanPlex/Corebuilder switches. In addition to the
"admin", "read", and "write" accounts, there is a "debug" account with a
password of "synnet" on shipped images (including those available for
download from infodeli.3com.com). The versions of firmware this was tested
under include 7.0.1 and 8.1.1. The debug account appears to have all the
privileges of the admin account plus some "debug" commands not available
to any other ID.
IMPACT:
If you allow "remote administration" (telnet access), well... yeah.
A: Yes, try username "monitor", with password "monitor".
LanPlex2500/Corebuilder
- login: debug
- password: synnet
LinkSwitch 2700, SuperStack 2700, CellPlex 7000
- login: tech
- password: tech
SuperStack II 1000 ja SuperStack II 3000
- login: monitor
- password: monitor
Users "monitor", "manager" and "security" are factory pre-existent,
with default passwords equal to the account name. It's user's
obligation to change all 3 passwords if he wants security.
AFAIK, this is valid for every SuperStack management module/equipment "Diplomacy; the art of saying 'nice doggie' till you can find a rock" Wynn Catlin