Cracking MSSQL(2005) hashes - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: Cracking MSSQL(2005) hashes (/thread-733.html) |
Cracking MSSQL(2005) hashes - deshtierre - 12-13-2011 Sorry to bother you but i was a Cain user so i am not familiar with the format used. I tried the inputformat hash(mixcase)alt but get the line exception errors... myhash file looks like: 4XXX4XX9CCXXXX3XBXX12XXCCXXFXXC47XXX8XXB:XX44XX0X Does somebody know what i miss. I can't find it on the web... Thanx Marcel RE: Cracking MSSQL(2005) hashes - atom - 12-13-2011 try this way: 0x0100$salt$hash 0x0100XX44XX0X4XXX4XX9CCXXXX3XBXX12XXCCXXFXXC47XXX8XXB RE: Cracking MSSQL(2005) hashes - Incisive - 12-16-2011 On the SQL Servers you are authorized to audit: SELECT sys.syslogins.name , sys.server_principals.type , LOGINPROPERTY(sys.syslogins.name,'PasswordHash') AS HashcatFormat , UPPER(RIGHT(sys.fn_varbintohexstr(CAST(RIGHT(sys.syslogins.password,10) AS VARBINARY(256))),40)) + ':' + UPPER(RIGHT(sys.fn_varbintohexstr(CAST(LEFT(RIGHT(sys.syslogins.password,12),2) AS VARBINARY(32))),8)) AS OCLHashCatLiteFormat FROM sys.syslogins LEFT OUTER JOIN sys.server_principals ON sys.server_principals.sid = sys.syslogins.sid |