Solved

Need to crack MD5 HASH

Posted on 2008-10-17
6
1,502 Views
Last Modified: 2012-06-21
So here's the story. We are moving to a new web host. In the process we need to move our MySQL database over. We have the Database.SQL file, and within it we found our password for Administrator. This password is encrypted with a HASH algorythm. We need to create a new database with this password, but we do not remember the Admin password, and our only hope is a 32-character alpha-numeric password (HASH).

Anyone know of any FREE websites/tools to help us with this.
0
Comment
Question by:pzozulka
  • 3
  • 2
6 Comments
 
LVL 18

Expert Comment

by:flyingsky
ID: 22743600
0
 
LVL 8

Author Comment

by:pzozulka
ID: 22743659
No that didn't work.
0
 
LVL 15

Expert Comment

by:MMDeveloper
ID: 22743693
is the software open source? You might be able to temporarily circumvent the password verification so you can login, then use the software's change-password functionality, and then undo your code changes mentioned earlier.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 15

Accepted Solution

by:
MMDeveloper earned 500 total points
ID: 22743700
That or just obtain the MD5 of whatever you want the password to be, and manually update the MD5 hash in the database and then login with the new password.
0
 
LVL 8

Author Comment

by:pzozulka
ID: 22743720
That's genious, I dont why I didnt think of that. Let me understand clearly. Find out the HASH for "Hello", and just replace the existing HASH with the HASH for Hello?
0
 
LVL 15

Expert Comment

by:MMDeveloper
ID: 22743841
you are correct
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
My files are missing from my Folder Lock encrypted folder 2 51
Secure removal of files encrypted by windows EFS 20 109
Openwrt vnstat 9 151
Verifying the TrueCrypt hashes 15 63
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now