SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 


How to recover a SQL Server login password.


How to recover a SQL Server login password.

Author
Message
BenWard
BenWard
Say Hey Kid
Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)

Group: General Forum Members
Points: 662 Visits: 827
Michael Meierruth (3/6/2013)
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,

Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). Unsure


There's no reason why it wouldn't, but getting the Windows hash of your password from the server isn't a trivial thing--you usually need admin access in order to read the SAM database, and if you already have that level of access, why do you care about hacking somebody else's password?

It's for finding those people who use the same password everywhere else...


And naughty people who want to steal/sell sensitive data, but do it with someone else's name in the audit log so some poor innocent bloke gets fired instead of the real criminal.

Ben

^ Thats me!


----------------------------------------
01010111011010000110000101110100 01100001 0110001101101111011011010111000001101100011001010111010001100101 01110100011010010110110101100101 011101110110000101110011011101000110010101110010
----------------------------------------
Michael Meierruth
Michael Meierruth
Ten Centuries
Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)Ten Centuries (1.1K reputation)

Group: General Forum Members
Points: 1054 Visits: 2514
And what's the point of what you're saying in your binary signature?
SQLCharger
SQLCharger
SSC Veteran
SSC Veteran (260 reputation)SSC Veteran (260 reputation)SSC Veteran (260 reputation)SSC Veteran (260 reputation)SSC Veteran (260 reputation)SSC Veteran (260 reputation)SSC Veteran (260 reputation)SSC Veteran (260 reputation)

Group: General Forum Members
Points: 260 Visits: 1422
Michael Meierruth (3/6/2013)
And what's the point of what you're saying in your binary signature?


A yes/no answer will suffice:-P

Cheers,

JohnA

MCM: SQL2008
BenWard
BenWard
Say Hey Kid
Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)Say Hey Kid (662 reputation)

Group: General Forum Members
Points: 662 Visits: 827
Michael Meierruth (3/6/2013)
And what's the point of what you're saying in your binary signature?


It's self-referential.

Ben

^ Thats me!


----------------------------------------
01010111011010000110000101110100 01100001 0110001101101111011011010111000001101100011001010111010001100101 01110100011010010110110101100101 011101110110000101110011011101000110010101110010
----------------------------------------
K. Brian Kelley
K. Brian Kelley
Keeper of the Duck
Keeper of the Duck (10K reputation)

Group: Moderators
Points: 10250 Visits: 1917
Michael Meierruth (3/6/2013)
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,

Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). Unsure


There's no reason why it wouldn't, but getting the Windows hash of your password from the server isn't a trivial thing--you usually need admin access in order to read the SAM database, and if you already have that level of access, why do you care about hacking somebody else's password?

It's for finding those people who use the same password everywhere else...


Or for escalating privileges, especially in a domain. Standard attack pattern:

1. Gain admin rights to a workstation or server.
2. Dump LSA Secrets. This gives you the password in plaintext for any services.
3. See what rights/group memberships those accounts have. They are now in your set of accounts to use for further compromise.
4. Dump the hashes from that system.
5. Use rainbow tables to gain the password from said hashes.
6. See what rights/group memberships those accounts have. They are also now in your set of accounts to use for further compromise.
7. If you've got a Domain Admin level at this point, you're set. You own the domain (and technically, the forest, meaning also every domain in said forest).
8. If you don't have an account with the level of privs that you want, spiderweb to other systems, trying the accounts you've captured and repeating steps 1-7.

3.

K. Brian Kelley
@‌kbriankelley
Nadrek
Nadrek
SSCommitted
SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)SSCommitted (1.9K reputation)

Group: General Forum Members
Points: 1891 Visits: 2729
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,

Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). Unsure


There's no reason why it wouldn't, but getting the Windows hash of your password from the server isn't a trivial thing--you usually need admin access in order to read the SAM database...


And this is why SQL Server Service accounts should be minimally privileged (i.e. NEVER ADMIN, either local or domain) - so someone breaking one sysadmin-level account on the SQL Server instance has a harder time getting into other machines.

Yes, oclHashcat-lite and/or oclHashcat-plus have settings for various forms of Windows and Active Directory passwords (as well as Oracle, Mac, Cisco, and other modes).
kapil_kk
kapil_kk
Hall of Fame
Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)Hall of Fame (3.1K reputation)

Group: General Forum Members
Points: 3091 Visits: 2766
This is not working on my pc....
It got this and SQL_passwords.txt gets generated:

Enter YES in uppercase if you accept this EULA:
YES
Initializing hashcat v0.45 by atom with 8 threads and 32mb segment-size...

output-format=0: No such file or directory


_______________________________________________________________
To get quick answer follow this link:
http://www.sqlservercentral.com/articles/Best+Practices/61537/
atchimule
atchimule
Grasshopper
Grasshopper (19 reputation)Grasshopper (19 reputation)Grasshopper (19 reputation)Grasshopper (19 reputation)Grasshopper (19 reputation)Grasshopper (19 reputation)Grasshopper (19 reputation)Grasshopper (19 reputation)

Group: General Forum Members
Points: 19 Visits: 424
Very interesting topic.

I tried but I am getting only password.which have normal character like a to Z

If i add any special character I am not getting proper output and it's take too long time .

one more is I am getting output in ppt format.I don't where I did mistake

I am not getting EULA: option in Command Prompt..

I used below script :

hashcat-cli32.exe -a 3 --pw-min=4 --pw-max=12 -m 132 -p : -o "C:\hashcat-0.46\SQL_passwords.txt" -output-format=0 -n 2 "C:\hashcat-0.46\Hashes.txt" -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1

If i used below scipt I am getting error :

hashcat-cli32.exe -a 3 --pw-min=4 --pw-max=12 -m 131 -p : -o "C:\hashcat-0.46\SQL_passwords.txt" -output-format=0 -n 2 "C:\hashcat-0.46\Hashes.txt" -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1

Skipping line : (Line length exception)
No hashes Found.

OS Version : Windows Xp
SQL Server 2008




Thanks
Atchi
skawa
skawa
Forum Newbie
Forum Newbie (3 reputation)Forum Newbie (3 reputation)Forum Newbie (3 reputation)Forum Newbie (3 reputation)Forum Newbie (3 reputation)Forum Newbie (3 reputation)Forum Newbie (3 reputation)Forum Newbie (3 reputation)

Group: General Forum Members
Points: 3 Visits: 18
I tried to use this but I keep getting an error saying Skipping Line: #0 ( line length exception) .. I can not figure out how to get around this. any help?
Brandon Forest
Brandon Forest
SSC-Enthusiastic
SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)SSC-Enthusiastic (167 reputation)

Group: General Forum Members
Points: 167 Visits: 446
I'm frustrated trying to recover a sa password from a legacy database that no one knows. I've tried using Hashcat and oclHashcat following this article and the HashcatGUI. I keep getting the same error message "Line-length exception". Here's my command: oclHashcat64.exe -a 0 -m 100 -p : --session=09163410 --force -o "D:\Applications\HashCat\UnHashed_sa.txt" --outfile-format=3 -n 32 -u 250 --gpu-temp-abort=90 -r "D:\Applications\HashCat\oclHashcat\oclHashcat-1.01\rules\best64.rule" "D:\Applications\HashCat\Hashed\Hashed_sa.txt" "D:\Applications\HashCat\WordLists\dic-0294.txt" "D:\Applications\HashCat\WordLists\ALLUP&R.DIC"

Any suggestions on how to resolve this would be appreciated.

Brandon_Forest@calquake.com
SQL DBA
CEA-IT
Go


Permissions

You can't post new topics.
You can't post topic replies.
You can't post new polls.
You can't post replies to polls.
You can't edit your own topics.
You can't delete your own topics.
You can't edit other topics.
You can't delete other topics.
You can't edit your own posts.
You can't edit other posts.
You can't delete your own posts.
You can't delete other posts.
You can't post events.
You can't edit your own events.
You can't edit other events.
You can't delete your own events.
You can't delete other events.
You can't send private messages.
You can't send emails.
You can read topics.
You can't vote in polls.
You can't upload attachments.
You can download attachments.
You can't post HTML code.
You can't edit HTML code.
You can't post IFCode.
You can't post JavaScript.
You can post emoticons.
You can't post or upload images.

Select a forum

































































































































































SQLServerCentral


Search