The mssql hash is saved in the master. dbo. sysxlogins table.
Select name, password from master. dbo. sysxlogins
User hash Extraction
Bytes
Decomposition:
Constant part: 0x0100
Salt part: 4E04BE46
Hybrid ciphertext: 023057E323AF27269E5B7DDCA140C98D225BDD3D
Capital letter ciphertext: 06E8EFE8CFAEC02985B27B38059FA3B18349612B plus 40 characters
With HASH, you can crack it. The tool used is CAIN.
Go to the CAIN cracking function and add an mssql hash to be cracked.
There are three text boxes to be written.
Enter the salt, mixed ciphertext, and uppercase letter ciphertext to crack the attack.
The username and password of mysql are saved in the user table of the mysql database. Find the user in the MySQLdatamysql directory. MYD user. MYI user. copy the three frm files to the mysql database directory to view the user's hash.
The SQL statement is as follows:
Use mysql;
Select user, password from user;
Get hash:
Test: * 085D85329E1557C869A120C9157315A07D51E8A7
Ogame: * 085D85329E1557C869A120C9157315A07D51E8A7
Iii6_com: * 085D85329E1557C869A120C9157315A07D51E8A7
Root: * 5D0B157F0A3BB4DB1A0092B4F270FBDA486EC6EB
User on the left side of the colon and HASH on the right side
The HASH value with "*" is the HASH of MYSQL5.
The HASH (that is, MYSQL323) of the old MYSQL version without the * sign)
Cracking:
You can use the passwordspro or cain cracking tool to crack it.