Open the ASA database with binary editing software such as ultraedit and winhex.
Search for the "public" string, which is case-insensitive and full-character-matched. The context includes users and user groups such as sa_debug, rs_systabgroup, DBO, and SYS. The added users are generally in front of sa_debug.
There are usually two identical user names, which need to be modified later. The User Password consists of 55 bytes in total. The last five bytes are the user's ID number, which is the same as the previous user. do not modify the last five bytes. The previous 50 bytes are the encrypted password, change the password to a known password.
The encrypted "SQL" is:
00007753 H: 24 C0 4E 03 48 C1 DC 06 F7 10 3B E3 75 EB B6 FC
00007763 H: 11 23 B9 E3 34 05 98 54 8C 2C D4 D1 03 33 D4 88
00007773 H: B2 4f 59 03 00 01 59 01 59 01 4E 01 4E 01 59 01
00007783 H: 4E 1A
Note: The test shows that the new database's DBA user's default "SQL" encrypted string cannot be applied to other users and cannot be cracked!
The modified password can be cracked.