Subject Re: Password hashes used in Firebird 1.5
Author gymkus
I have the same problem, I also want to implement my own backend to do queries on my own firebird 1.5 databse.
The database comes with an other backend tool to mange students in our school.

The big problem is, that this original backend tool isn't flexible enough to send queries to the database, so I want to implement my own one.

With wireshark I found a user called 1234567890 in combination with the password hash 0VpxIenaHcU

The hash is 11 charakters long, so I think the salt is missing.
If I would have the salt I would push these login informations into "John the ripper" to find the password.

Does anyone know how to brute-force-attack a 11-charakter DES hash ???


--- In firebird-support@yahoogroups.com, Matt Ford <matt@...> wrote:
>
> I use a piece of software which has firebird as a backend. I want to
> have read access to the backend database in order to get to the raw data
> but do not have the database password to do that. Hence me trying to
> crack the password to obtain access to my own data.
>