The password in the database is stored as F40A1DD8BD13322642527D1ADC22FA6DF1B1D0ED Can it be decrypted?
- No, because most likely hash functions are used, such as md5 and even crc32 - no. If you know the encryption algorithm, you can find out whether there are "dictionary" passwords. And so no. - nick_n_a
2 answers
This is similar to sha1 hash (length 40). To decipher it is the same as to pick up at random, practically not realistic))
Only hope that the user has set a simple password and get the sha1 hash of all simple passwords and compare it with the original one.
I tried a couple of online services to decrypt, but they do not know anything about this hash)
- Clearly. Maybe you know how to send a request to the database to update the password?. At Havij e Query does not work xD - Sauron
- @Sauron here is about a new question to ask - Nick Volynkin ♦
- @Sauron is your base? Can you connect to it?) - jekaby
update users set password=upper(sha1('new_password')) where id=1;- jekaby- Of course not).
update users set password...I understand, but where to send it to Havij it doesn’t work. - Sauron
It is impossible.
This is not encryption, it is a hash of the built-in function PASSWORD in MySQL.
They say that in versions 5.1, 5.5 and 5.6 inside this function SHA1 is applied twice to the line with the password, but there is no this part in the documentation. Here you can check:
SELECT SHA1(UNHEX(SHA1('password'))), PASSWORD('password'); The documentation, however, still says that for any other purposes, except for authentication in MySQL, this function should not be used.