Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 


How to recover a SQL Server login password.


How to recover a SQL Server login password.

Author
Message
BenWard
BenWard
SSC-Addicted
SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)

Group: General Forum Members
Points: 437 Visits: 821
Michael Meierruth (3/6/2013)
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,

Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). Unsure


There's no reason why it wouldn't, but getting the Windows hash of your password from the server isn't a trivial thing--you usually need admin access in order to read the SAM database, and if you already have that level of access, why do you care about hacking somebody else's password?

It's for finding those people who use the same password everywhere else...


And naughty people who want to steal/sell sensitive data, but do it with someone else's name in the audit log so some poor innocent bloke gets fired instead of the real criminal.

Ben

^ Thats me!


----------------------------------------
01010111011010000110000101110100 01100001 0110001101101111011011010111000001101100011001010111010001100101 01110100011010010110110101100101 011101110110000101110011011101000110010101110010
----------------------------------------
Michael Meierruth
Michael Meierruth
SSChasing Mays
SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)SSChasing Mays (647 reputation)

Group: General Forum Members
Points: 647 Visits: 2508
And what's the point of what you're saying in your binary signature?
SQLCharger
SQLCharger
SSC-Enthusiastic
SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)SSC-Enthusiastic (178 reputation)

Group: General Forum Members
Points: 178 Visits: 1400
Michael Meierruth (3/6/2013)
And what's the point of what you're saying in your binary signature?


A yes/no answer will suffice:-P

Cheers,

JohnA

MCM: SQL2008
BenWard
BenWard
SSC-Addicted
SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)SSC-Addicted (437 reputation)

Group: General Forum Members
Points: 437 Visits: 821
Michael Meierruth (3/6/2013)
And what's the point of what you're saying in your binary signature?


It's self-referential.

Ben

^ Thats me!


----------------------------------------
01010111011010000110000101110100 01100001 0110001101101111011011010111000001101100011001010111010001100101 01110100011010010110110101100101 011101110110000101110011011101000110010101110010
----------------------------------------
K. Brian Kelley
K. Brian Kelley
Keeper of the Duck
Keeper of the Duck (6.8K reputation)

Group: Moderators
Points: 6816 Visits: 1917
Michael Meierruth (3/6/2013)
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,

Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). Unsure


There's no reason why it wouldn't, but getting the Windows hash of your password from the server isn't a trivial thing--you usually need admin access in order to read the SAM database, and if you already have that level of access, why do you care about hacking somebody else's password?

It's for finding those people who use the same password everywhere else...


Or for escalating privileges, especially in a domain. Standard attack pattern:

1. Gain admin rights to a workstation or server.
2. Dump LSA Secrets. This gives you the password in plaintext for any services.
3. See what rights/group memberships those accounts have. They are now in your set of accounts to use for further compromise.
4. Dump the hashes from that system.
5. Use rainbow tables to gain the password from said hashes.
6. See what rights/group memberships those accounts have. They are also now in your set of accounts to use for further compromise.
7. If you've got a Domain Admin level at this point, you're set. You own the domain (and technically, the forest, meaning also every domain in said forest).
8. If you don't have an account with the level of privs that you want, spiderweb to other systems, trying the accounts you've captured and repeating steps 1-7.

3.

K. Brian Kelley
@‌kbriankelley
Nadrek
Nadrek
Ten Centuries
Ten Centuries (1K reputation)Ten Centuries (1K reputation)Ten Centuries (1K reputation)Ten Centuries (1K reputation)Ten Centuries (1K reputation)Ten Centuries (1K reputation)Ten Centuries (1K reputation)Ten Centuries (1K reputation)

Group: General Forum Members
Points: 1035 Visits: 2673
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,

Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). Unsure


There's no reason why it wouldn't, but getting the Windows hash of your password from the server isn't a trivial thing--you usually need admin access in order to read the SAM database...


And this is why SQL Server Service accounts should be minimally privileged (i.e. NEVER ADMIN, either local or domain) - so someone breaking one sysadmin-level account on the SQL Server instance has a harder time getting into other machines.

Yes, oclHashcat-lite and/or oclHashcat-plus have settings for various forms of Windows and Active Directory passwords (as well as Oracle, Mac, Cisco, and other modes).
kapil_kk
kapil_kk
SSCrazy
SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)SSCrazy (2.4K reputation)

Group: General Forum Members
Points: 2419 Visits: 2763
This is not working on my pc....
It got this and SQL_passwords.txt gets generated:

Enter YES in uppercase if you accept this EULA:
YES
Initializing hashcat v0.45 by atom with 8 threads and 32mb segment-size...

output-format=0: No such file or directory


_______________________________________________________________
To get quick answer follow this link:
http://www.sqlservercentral.com/articles/Best+Practices/61537/
atchimule
atchimule
Forum Newbie
Forum Newbie (9 reputation)Forum Newbie (9 reputation)Forum Newbie (9 reputation)Forum Newbie (9 reputation)Forum Newbie (9 reputation)Forum Newbie (9 reputation)Forum Newbie (9 reputation)Forum Newbie (9 reputation)

Group: General Forum Members
Points: 9 Visits: 424
Very interesting topic.

I tried but I am getting only password.which have normal character like a to Z

If i add any special character I am not getting proper output and it's take too long time .

one more is I am getting output in ppt format.I don't where I did mistake

I am not getting EULA: option in Command Prompt..

I used below script :

hashcat-cli32.exe -a 3 --pw-min=4 --pw-max=12 -m 132 -p : -o "C:\hashcat-0.46\SQL_passwords.txt" -output-format=0 -n 2 "C:\hashcat-0.46\Hashes.txt" -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1

If i used below scipt I am getting error :

hashcat-cli32.exe -a 3 --pw-min=4 --pw-max=12 -m 131 -p : -o "C:\hashcat-0.46\SQL_passwords.txt" -output-format=0 -n 2 "C:\hashcat-0.46\Hashes.txt" -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1

Skipping line : (Line length exception)
No hashes Found.

OS Version : Windows Xp
SQL Server 2008




Thanks
Atchi
skawa
skawa
Forum Newbie
Forum Newbie (1 reputation)Forum Newbie (1 reputation)Forum Newbie (1 reputation)Forum Newbie (1 reputation)Forum Newbie (1 reputation)Forum Newbie (1 reputation)Forum Newbie (1 reputation)Forum Newbie (1 reputation)

Group: General Forum Members
Points: 1 Visits: 18
I tried to use this but I keep getting an error saying Skipping Line: #0 ( line length exception) .. I can not figure out how to get around this. any help?
Brandon Forest
Brandon Forest
SSC Journeyman
SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)SSC Journeyman (87 reputation)

Group: General Forum Members
Points: 87 Visits: 446
I'm frustrated trying to recover a sa password from a legacy database that no one knows. I've tried using Hashcat and oclHashcat following this article and the HashcatGUI. I keep getting the same error message "Line-length exception". Here's my command: oclHashcat64.exe -a 0 -m 100 -p : --session=09163410 --force -o "D:\Applications\HashCat\UnHashed_sa.txt" --outfile-format=3 -n 32 -u 250 --gpu-temp-abort=90 -r "D:\Applications\HashCat\oclHashcat\oclHashcat-1.01\rules\best64.rule" "D:\Applications\HashCat\Hashed\Hashed_sa.txt" "D:\Applications\HashCat\WordLists\dic-0294.txt" "D:\Applications\HashCat\WordLists\ALLUP&R.DIC"

Any suggestions on how to resolve this would be appreciated.

Brandon_Forest@calquake.com
SQL DBA
CEA-IT
Go


Permissions

You can't post new topics.
You can't post topic replies.
You can't post new polls.
You can't post replies to polls.
You can't edit your own topics.
You can't delete your own topics.
You can't edit other topics.
You can't delete other topics.
You can't edit your own posts.
You can't edit other posts.
You can't delete your own posts.
You can't delete other posts.
You can't post events.
You can't edit your own events.
You can't edit other events.
You can't delete your own events.
You can't delete other events.
You can't send private messages.
You can't send emails.
You can read topics.
You can't vote in polls.
You can't upload attachments.
You can download attachments.
You can't post HTML code.
You can't edit HTML code.
You can't post IFCode.
You can't post JavaScript.
You can post emoticons.
You can't post or upload images.

Select a forum

































































































































































SQLServerCentral


Search