01-10-2022, 09:54 PM
We have a software package that uses SQL 2012. In one of the tables I can see all of the user logins. There is a password column and a salt column. Of course the password is hashed. Maybe wrongfully, but I would assume I can't just can't crack the hash in its current form.
What is the proper way to extract these hashes/salts to run through hashcat?
What is the proper way to extract these hashes/salts to run through hashcat?