Subject | Re: [firebird-support] Re: Password hashes used in Firebird 1.5 |
---|---|
Author | Matt Ford |
Post date | 2010-09-23T11:01:03Z |
I use a piece of software which has firebird as a backend. I want to
have read access to the backend database in order to get to the raw data
but do not have the database password to do that. Hence me trying to
crack the password to obtain access to my own data.
have read access to the backend database in order to get to the raw data
but do not have the database password to do that. Hence me trying to
crack the password to obtain access to my own data.
On 23/09/2010 11:12, Kjell Rilbe wrote:
> pantilamon skriver:
>> Since writing this I have noticed that if you simply copy the
>> security2.fdb database and rename it to something else then it can be
>> opened up and you can view the password hashes.
>>
>> I understand in firebird 2 the password hash is SHA-1 of a random salt,
>> the username and then the password. Where is this random salt stored?
> Out of curiosity: What are you trying to do, that requires you to
> investiagte these things?
>
> Kjell