Subject | Re: [firebird-support] Re: Password hashes used in Firebird 1.5 |
---|---|
Author | Matt Ford |
Post date | 2010-09-23T12:48:38Z |
I've done the same using wireshark on Firebird 2.0 and found the
password hash TLZMnMAhn3I
Here is some information that is quite helpful to this investigation:
http://firebird.svn.sourceforge.net/viewvc/firebird/firebird/trunk/doc/README.sha1?revision=51591&view=markup
password hash TLZMnMAhn3I
Here is some information that is quite helpful to this investigation:
http://firebird.svn.sourceforge.net/viewvc/firebird/firebird/trunk/doc/README.sha1?revision=51591&view=markup
On 23/09/2010 12:58, gymkus wrote:
>
> I have the same problem, I also want to implement my own backend to do
> queries on my own firebird 1.5 databse.
> The database comes with an other backend tool to mange students in our
> school.
>
> The big problem is, that this original backend tool isn't flexible
> enough to send queries to the database, so I want to implement my own one.
>
> With wireshark I found a user called 1234567890 in combination with
> the password hash 0VpxIenaHcU
>
> The hash is 11 charakters long, so I think the salt is missing.
> If I would have the salt I would push these login informations into
> "John the ripper" to find the password.
>
> Does anyone know how to brute-force-attack a 11-charakter DES hash ???
>
> --- In firebird-support@yahoogroups.com
> <mailto:firebird-support%40yahoogroups.com>, Matt Ford <matt@...> wrote:
> >
> > I use a piece of software which has firebird as a backend. I want to
> > have read access to the backend database in order to get to the raw
> data
> > but do not have the database password to do that. Hence me trying to
> > crack the password to obtain access to my own data.
> >
>
>
[Non-text portions of this message have been removed]