拿到多种数据库密码的语句
发布:admin | 发布时间: 2010年1月26日有没access也可以抓取的?
各种数据库密码hash获取语句,也可以直接使用sqlmap这个注入工具!
SQLServer2000:-
SELECTpasswordfrommaster。dbo。sysxloginswherename='sa'
0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A
0×0100-constantheader
34767D5C-salt
0CFA5FDCA28C4A56085E65E882E71CB0ED250341-casesenstivehash
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A-uppercasehash
cracktheuppercasehashin'cainandabel'andthenworkthecasesentivehash
SQLserver2005:-
SELECTpassword_hashFROMsys。sql_loginswherename='sa'
0×0100993BF2315F36CC441485B35C4D84687DC02C78B0E680411F
0×0100-constantheader
993BF231-salt
5F36CC441485B35C4D84687DC02C78B0E680411F-casesensitivehash
crackcasesensitivehashincain,trybruteforceanddictionarybasedattacks。
update:-followingbernardo'scomments:-
usefunctionfn_varbintohexstr()tocastpasswordinahexstring。
e。g。selectnamefromsysxloginsunionallselectmaster。dbo。fn_varbintohexstr(password)fromsysxlogins
MYSQL:-
InMySQLyoucangeneratehashesinternallyusingthepassword(),md5(),orsha1functions。password()isthefunctionusedforMySQL'sownuserauthenticationsystem。Itreturnsa16-bytestringforMySQLversionspriorto4。1,anda41-bytestring(basedonadoubleSHA-1hash)forversions4。1andup。md5()isavailablefromMySQLversion3。23。2andsha1()wasaddedlaterin4。0。2。
*mysql<4。1
mysql>SELECTPASSWORD('mypass');
+——————–+
|PASSWORD('mypass')|
+——————–+
|6f8c114b58f2ce9e|
+——————–+
*mysql>=4。1
mysql>SELECTPASSWORD('mypass');
+——————————————-+
|PASSWORD('mypass')|
+——————————————-+
|*6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4|
+——————————————-+
Selectuser,passwordfrommysql。user
Thehashescanbecrackedin'cainandabel'
Postgres:-
PostgreskeepsMD5-basedpasswordhashesfordatabase-levelusersinthepg_shadowtable。Youneedtobethedatabasesuperusertoreadthistable(usuallycalled"postgres"or"pgsql")
selectusename,passwdfrompg_shadow;
usename|passwd
——————+————————————-
testuser|md5fabb6d7172aadfda4753bf0507ed4396
usemdcracktocrackthesehashes:-
$wineMDCrack-sse。exe–algorithm=MD5–append=testuserfabb6d7172aadfda4753bf0507ed4396
Oracle:-
selectname,password,spare4fromsys。user$
hashescouldbecrackedusing'cainandabel'orthc-orakelcrackert11g
MoreonOraclelater,iamabitbored…。
文章如转载,请注明转载自:http://www.5iadmin.com/post/76.html
- 相关文章:
发表评论
◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。