1, if you have an EBS environment apps user password, you can crack the app user's password
Reference: How to hack user passwords under Oracle EBS R12
2, if there is no apps user password, also want to crack the environment a password. To see "Luck", if there is a corresponding clone environment B,ebs DBA has not modified the $context_file content, and has the data query permission of environment A, can crack the apps password
Reference: Oracle EBS R12-use plsql to get/hack apps passwords and user passwords in EBS
1) in Environment B, create the package in the above, and in environment a query the password of the guest user after encryption
SELECT Encrypted_foundation_password from apps.fnd_user WHERE user_name = ' GUEST ';
2) Execute in Environment B:
SELECT xxdba_fnd_security.decrypt (' guest/oracle ' , ' zg808db5455bbac039b012230e429c46873cc497a43b198e30fb0a54af25c103fecad72e2133666ff43618256916dddfc12e ') From DUAL;
3, in order to avoid the production environment password malicious hack, EBS DBA in the clone environment to modify $context_file bar, do not retain the guest's default password Oracle.