9th Jul 2002 [SBWID-5521]
COMMAND
SQL Server users passwords cryptanalysis whitepaper and tool
SYSTEMS AFFECTED
SQL 7, 2000 and other ?
PROBLEM
David Litchfield of NGSSoftware Insight Security Research posted a
whitepaper and tool that expose weakness in the encryption scheme of
SQL server user\'s passwords.
\" The paper discusses the manner in which they are hashed (the
passwords) and how they can be more easily brute forced as two hashes
are stored: a case sensitive password hash and an upper case password
hash are produced. Needless to say, when auditing password strength, it
is far easier to go after the UPPER cased version. The paper contains
also contains some demonstration source code for performing a
dictionary based audit against the hashes and NGSSoftware have produced
an optomized GUI based tool, as well. \"
Get it from :
http://www.nextgenss.com/papers/cracking-sql-passwords.pdf
http://www.nextgenss.com/products/ngssqlcrack.html
Update (10 July 2002)
======
Toni Lassila [toni.lassila@mc-europe.com] comments on :
An added weakness that has not been widely noted: If you select a
case-insensitive collation for your SQL Server installation, the user
accounts and passwords will be case insensitive as well. This means
there is a good chance any given SQL Server will have very weak
passwords.
You can verify if you are operating with case-insensitive passwords by
running this query:
Select SERVERPROPERTY(N\'Collation\')
If the name of the collation setting contains \'CI\' instead of \'CS\',
all your SQL login passwords are case-insensitive.
Update (15 July 2002)
======
Patrik Karlsson has released a decoder under GPL (Linux & Win32 ) :
http://www.cqure.net/tools10.html
SOLUTION
?
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH