Database Password Hashes Cracking - How to Extract Hashes from Databases

SQL Server 2000: -
SELECT password from master.dbo.sysxlogins where name='sa' SELECT password from master.dbo.sysxlogins where name = 'sa'
0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341 0 × 010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A 2FD54D6119FFF04129A1D72E7C3194F7284A7F3A

0×0100- constant header 0 × 0100 - constant header
34767D5C- salt 34767D5C-salt
0CFA5FDCA28C4A56085E65E882E71CB0ED250341- case senstive hash 0CFA5FDCA28C4A56085E65E882E71CB0ED250341-case senstive hash
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A- upper case hash 2FD54D6119FFF04129A1D72E7C3194F7284A7F3A-upper case hash...

Includes:
*SQL Server 2000
*SQL server 2005
*MYSQL
*Postgres
*Oracle

Read More: http://translate.google.com/translate?hl=en&sl=zh-CN&u=http://huaidan.org/archives/2972.html

hash krackin rss feed Subscribe in a reader


Copyright 2011 | All software listed is freeware unless otherwise stated. All software listed is property of the publisher. The software on this website may be reported by antivirus as malicious, however this can be disregarded due to the nature of these tools. Hash Krackin can not be held responsible for any of your actions performed by the resources of this website. Please contact the webmaster of any broken links or password cracker resources you would like featured on this site.