1. Suppose you have an EBS environment apps user password that can break the user's application password
Reference: How to hack user password under Oracle EBS R12
2, assuming no apps user password. Also want to crack the environment apassword. To see "Luck", suppose there is a corresponding clone environment B,ebs DBA has not changed $context_file content. and has the environment A's data query permission, can crack Appspassword
Reference: Oracle EBS R12-use plsql to obtain/crack users in Appspassword and EBS password
1) Create the package in environment B above. Querying the password of Guest user encryption in environment a
SELECT Encrypted_foundation_password from apps.fnd_user WHERE user_name = ' GUEST ';
2) Run in Environment B:
SELECT xxdba_fnd_security.decrypt (' guest/oracle ' , ' zg808db5455bbac039b012230e429c46873cc497a43b198e30fb0a54af25c103fecad72e2133666ff43618256916dddfc12e ') From DUAL;
3. To avoid the password of the production environment being hacked, the EBS DBA changes $context_file in the clone environment, and does not retain the guest's default passwordoracle.
Copyright notice: This article blog original article. Blogs, without consent, may not be reproduced.
Chapped EBS R12 Application and database user password