Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Web :: Apps :: web5521.htm

SQL Server users passwords cryptanalysis whitepaper and tool
9th Jul 2002 [SBWID-5521]

	SQL Server users passwords cryptanalysis whitepaper and tool


	SQL 7, 2000 and other ?


	David Litchfield of  NGSSoftware  Insight  Security  Research  posted  a
	whitepaper and tool that expose weakness in  the  encryption  scheme  of
	SQL server user\'s passwords.

	\" The paper  discusses  the  manner  in  which  they  are  hashed  (the
	passwords) and how they can be more easily brute forced  as  two  hashes
	are stored: a case sensitive password hash and an  upper  case  password
	hash are produced. Needless to say, when auditing password strength,  it
	is far easier to go after the UPPER cased version.  The  paper  contains
	also  contains  some  demonstration  source  code   for   performing   a
	dictionary based audit against the hashes and NGSSoftware have  produced
	an optomized GUI based tool, as well. \"

	Get it from :




	 Update (10 July 2002)



	Toni Lassila [] comments on :

	An added weakness that has not  been  widely  noted:  If  you  select  a
	case-insensitive collation for your SQL Server  installation,  the  user
	accounts and passwords will be case  insensitive  as  well.  This  means
	there is a good  chance  any  given  SQL  Server  will  have  very  weak

	You can verify if you are operating with case-insensitive  passwords  by
	running this query:

	Select SERVERPROPERTY(N\'Collation\')


	If the name of the collation setting contains \'CI\' instead of  \'CS\',
	all your SQL login passwords are case-insensitive.


	 Update (15 July 2002)



	Patrik Karlsson has released a decoder under GPL (Linux & Win32 ) :




TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH