Subject Re: [firebird-support] Re: Password hashes used in Firebird 1.5
Author Matt Ford
I've done the same using wireshark on Firebird 2.0 and found the
password hash TLZMnMAhn3I

Here is some information that is quite helpful to this investigation:
http://firebird.svn.sourceforge.net/viewvc/firebird/firebird/trunk/doc/README.sha1?revision=51591&view=markup

On 23/09/2010 12:58, gymkus wrote:
>
> I have the same problem, I also want to implement my own backend to do
> queries on my own firebird 1.5 databse.
> The database comes with an other backend tool to mange students in our
> school.
>
> The big problem is, that this original backend tool isn't flexible
> enough to send queries to the database, so I want to implement my own one.
>
> With wireshark I found a user called 1234567890 in combination with
> the password hash 0VpxIenaHcU
>
> The hash is 11 charakters long, so I think the salt is missing.
> If I would have the salt I would push these login informations into
> "John the ripper" to find the password.
>
> Does anyone know how to brute-force-attack a 11-charakter DES hash ???
>
> --- In firebird-support@yahoogroups.com
> <mailto:firebird-support%40yahoogroups.com>, Matt Ford <matt@...> wrote:
> >
> > I use a piece of software which has firebird as a backend. I want to
> > have read access to the backend database in order to get to the raw
> data
> > but do not have the database password to do that. Hence me trying to
> > crack the password to obtain access to my own data.
> >
>
>



[Non-text portions of this message have been removed]