Solved

Need to view the username and password a program is using to access a sql database

Posted on 2007-12-02
9
190 Views
Last Modified: 2010-04-21
Hey there, I had one of my team members compile a custome installer for a reporting program that accesses a SQL database.  My team member is gone now and we had an issue with the sql server needing to be reloaded.

We have access to the DB through the manager and know the SA password.

We know the SQL user account being used to query the database (is shows up in the event viewer log as logon filed for user 'username') when the application is run and trying to connect to the database.

How can we find out the PW the compiled program is trying to use so we can change the sql password for the user?

Is there anyway to sniff or is there an app withing the sql2005 tools to monitor usernames and passwords being used by incoming connections?

0
Comment
Question by:bcameron70
  • 6
  • 3
9 Comments
 
LVL 25

Expert Comment

by:imitchie
ID: 20392933
For security purposes, password fields are not recorded anywhere. You should simply reset the password using sp_password. You don't have to know the old password
0
 
LVL 25

Expert Comment

by:imitchie
ID: 20392964
I see where you're coming from. Please have a look at this Ppt, which contains a link to another Ppt.
http://www.sqldbatips.com/presentations/REALLY_HACKING_SQL.ppt
If that is too hard, just get
http://www.downloadjunction.com/product/store/4329/index.html
0
 

Author Comment

by:bcameron70
ID: 20392976
I have the SP password, I am trying to reverse-engineer the dbase connection by finding out what the application is throwing at the dbase for a password so I can make the dbase password match.

The program was compiled and my guy who had done it is gone, so I am trying to avoid re-compiling the program is possible.
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 

Author Comment

by:bcameron70
ID: 20392984
just saw your update after posting my reply, looks like you got yours in first, I'll be back in a few to try, thank you
0
 

Author Comment

by:bcameron70
ID: 20393267
Ive tried the utility to see if it catches and nothing comes across.  I tried logging into another machine on the network to pass through but no luck.

I tried ethereal jsut in case, but I do not see anything passing of relevance.

Any other thoughts?
0
 
LVL 25

Accepted Solution

by:
imitchie earned 500 total points
ID: 20393376
I never had problems with ethereal, and it doesn't matter whether it's 2000/2005, because it's the client providing the info.. I can't think of anything else except maybe you have misused some settings. Try Omnipeek if that's easier to use
0
 

Author Comment

by:bcameron70
ID: 20393387
I'll give omnipeek a shot.

Ethereal has been very successful in the past for me, I did not see any passwords traversing as mentioned in the ppt link you sent.  Maybe I just have an untrained eye.

0
 

Author Comment

by:bcameron70
ID: 20414688
Thank you for your effort on this, I ended up allowing all the sql permissions to the user and then opened up the linked tabled and applying another password which seemed to work.

Thank you again
0
 

Author Closing Comment

by:bcameron70
ID: 31412241
Wanted to award points for trying
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In SQL Server, when rows are selected from a table, does it retrieve data in the order in which it is inserted?  Many believe this is the case. Let us try to examine for ourselves with an example. To get started, use the following script, wh…
In this article I will describe the Copy Database Wizard method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question