免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
123下一页
最近访问板块 发新帖
查看: 5772 | 回复: 25
打印 上一主题 下一主题

MySQL密码遗忘解决方法zt [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2003-05-29 15:28 |只看该作者 |倒序浏览
若是windows系统,mysqladmin的密码在my.ini文件中明文存储
Linux中,如果密码遗忘,这里提供几个解决方法
停掉mysql
# /etc/rc.d/init.d/mysql stop

以--skip-grant-table 的參數啟動mysql
# safe_mysql --skip-grant-table&

更改root密码
#mysql
use mysql
UPDATE user SET password=password('new') WHERE user='root';
mysql>; FLUSH PRIVILEGES;
\q

停掉mysql
# mysqladmin -uroot -p shutdown
Enter password:new

第二种可以利用mysql的密码的脆弱加密机制


用skip-grant-table方式启动后查出mysql hash,
#mysql mysql
show tables;
select user,password from user;

之后使用mysqlfast hash 得出密码
老外的源程序
/* This program is public domain. Share and enjoy.
*
* Example:
* $ gcc -O2 -fomit-frame-pointer mysqlfast.c -o mysqlfast
* $ mysqlfast 6294b50f67eda209
* Hash: 6294b50f67eda209
* Trying length 3
* Trying length 4
* Found pass: barf
*
* The MySQL password hash function could be strengthened considerably
* by:
* - making two passes over the password
* - using a bitwise rotate instead of a left shift
* - causing more arithmetic overflows
*/
#include <stdio.h>;
typedef unsigned long u32;
/* Allowable characters in password; 33-126 is printable ascii */
#define MIN_CHAR 33
#define MAX_CHAR 126
/* Maximum length of password */
#define MAX_LEN 12
#define MASK 0x7fffffffL
int crack0(int stop, u32 targ1, u32 targ2, int *pass_ary)
{
  int i, c;
  u32 d, e, sum, step, diff, div, xor1, xor2, state1, state2;
  u32 newstate1, newstate2, newstate3;
  u32 state1_ary[MAX_LEN-2], state2_ary[MAX_LEN-2];
  u32 xor_ary[MAX_LEN-3], step_ary[MAX_LEN-3];
  i = -1;
  sum = 7;
  state1_ary[0] = 1345345333L;
  state2_ary[0] = 0x12345671L;
  while (1) {
    while (i < stop) {
      i++;
      pass_ary = MIN_CHAR;
      step_ary = (state1_ary & 0x3f) + sum;
      xor_ary = step_ary*MIN_CHAR + (state1_ary << ;
      sum += MIN_CHAR;
      state1_ary[i+1] = state1_ary ^ xor_ary;
      state2_ary[i+1] = state2_ary
        + ((state2_ary << ^ state1_ary[i+1]);
    }
    state1 = state1_ary[i+1];
    state2 = state2_ary[i+1];
    step = (state1 & 0x3f) + sum;
    xor1 = step*MIN_CHAR + (state1 << ;
    xor2 = (state2 << ^ state1;
    for (c = MIN_CHAR; c <= MAX_CHAR; c++, xor1 += step) {
      newstate2 = state2 + (xor1 ^ xor2);
      newstate1 = state1 ^ xor1;
      newstate3 = (targ2 - newstate2) ^ (newstate2 << ;
      div = (newstate1 & 0x3f) + sum + c;
      diff = ((newstate3 ^ newstate1) - (newstate1 << ) & MASK;
      if (diff % div != 0) continue;
      d = diff / div;
      if (d < MIN_CHAR || d >; MAX_CHAR) continue;
      div = (newstate3 & 0x3f) + sum + c + d;
      diff = ((targ1 ^ newstate3) - (newstate3 << ) & MASK;
      if (diff % div != 0) continue;
      e = diff / div;
      if (e < MIN_CHAR || e >; MAX_CHAR) continue;
      pass_ary[i+1] = c;
      pass_ary[i+2] = d;
      pass_ary[i+3] = e;
      return 1;
    }
    while (i >;= 0 && pass_ary >;= MAX_CHAR) {
      sum -= MAX_CHAR;
      i--;
    }
    if (i < 0) break;
    pass_ary++;
    xor_ary += step_ary;
    sum++;
    state1_ary[i+1] = state1_ary ^ xor_ary;
    state2_ary[i+1] = state2_ary
      + ((state2_ary << ^ state1_ary[i+1]);
  }
  return 0;
}
void crack(char *hash)
{
  int i, len;
  u32 targ1, targ2, targ3;
  int pass[MAX_LEN];
  if ( sscanf(hash, "%8lx%lx", &targ1, &targ2) != 2 ) {
    printf("Invalid password hash: %s\n", hash);
    return;
  }
  printf("Hash: %08lx%08lx\n", targ1, targ2);
  targ3 = targ2 - targ1;
  targ3 = targ2 - ((targ3 << ^ targ1);
  targ3 = targ2 - ((targ3 << ^ targ1);
  targ3 = targ2 - ((targ3 << 8) ^ targ1);
  for (len = 3; len <= MAX_LEN; len++) {
    printf("Trying length %d\n", len);
    if ( crack0(len-4, targ1, targ3, pass) ) {
      printf("Found pass: ";
      for (i = 0; i < len; i++)
        putchar(pass);
      putchar('\n');
      break;
    }
  }
  if (len >; MAX_LEN)
    printf("ass not found\n";
}
int main(int argc, char *argv[])
{
  int i;
  if (argc <= 1)
    printf("usage: %s hash\n", argv[0]);
  for (i = 1; i < argc; i++)
    crack(argv);
  return 0;
}

论坛徽章:
0
2 [报告]
发表于 2003-06-02 15:55 |只看该作者

MySQL密码遗忘解决方法zt

[TOOL] High-speed Brute-force Password Cracker for MySQL
From: SecuriTeam (support_at_securiteam.com)
Date: 05/05/03

Next message: SecuriTeam: "[TOOL] FlashFXP sites.dat Decryption"
Previous message: SecuriTeam: "[TOOL] Microsoft IIS Authentication Manager Account Confirmation Vulnerability"
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]

--------------------------------------------------------------------------------

To: list@securiteam.com
Date: 5 May 2003 18:01:49 +0200


The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion


In the US?


Contact Beyond Security at our new California office
housewarming rates on automated network vulnerability
scanning. We also welcome ISPs and other resellers!


Please contact us at: 323-882-8286 or ussales@beyondsecurity.com
- - - - - - - - -




  High-speed Brute-force Password Cracker for MySQL
------------------------------------------------------------------------



DETAILS


This tool is a high-speed brute-force password cracker for MySQL hashed
passwords. It can break an 8-character password containing any printable
ASCII characters in a matter of hours on an ordinary PC.


Tool:
/* This program is public domain. Share and enjoy.
*
* Example:
* $ gcc -O2 -fomit-frame-pointer mysqlfast.c -o mysqlfast
* $ mysqlfast 6294b50f67eda209
* Hash: 6294b50f67eda209
* Trying length 3
* Trying length 4
* Found pass: barf
*
* The MySQL password hash function could be strengthened considerably
* by:
* - making two passes over the password
* - using a bitwise rotate instead of a left shift
* - causing more arithmetic overflows
*/


#include <stdio.h>;


typedef unsigned long u32;


/* Allowable characters in password; 33-126 is printable ascii */
#define MIN_CHAR 33
#define MAX_CHAR 126


/* Maximum length of password */
#define MAX_LEN 12


#define MASK 0x7fffffffL


int crack0(int stop, u32 targ1, u32 targ2, int *pass_ary)
{
  int i, c;
  u32 d, e, sum, step, diff, div, xor1, xor2, state1, state2;
  u32 newstate1, newstate2, newstate3;
  u32 state1_ary[MAX_LEN-2], state2_ary[MAX_LEN-2];
  u32 xor_ary[MAX_LEN-3], step_ary[MAX_LEN-3];
  i = -1;
  sum = 7;
  state1_ary[0] = 1345345333L;
  state2_ary[0] = 0x12345671L;


  while (1) {
    while (i < stop) {
      i++;
      pass_ary[i] = MIN_CHAR;
      step_ary[i] = (state1_ary[i] & 0x3f) + sum;
      xor_ary[i] = step_ary[i]*MIN_CHAR + (state1_ary[i] << 8);
      sum += MIN_CHAR;
      state1_ary[i+1] = state1_ary[i] ^ xor_ary[i];
      state2_ary[i+1] = state2_ary[i]
        + ((state2_ary[i] << 8) ^ state1_ary[i+1]);
    }


    state1 = state1_ary[i+1];
    state2 = state2_ary[i+1];
    step = (state1 & 0x3f) + sum;
    xor1 = step*MIN_CHAR + (state1 << 8);
    xor2 = (state2 << 8) ^ state1;


    for (c = MIN_CHAR; c <= MAX_CHAR; c++, xor1 += step) {
      newstate2 = state2 + (xor1 ^ xor2);
      newstate1 = state1 ^ xor1;


      newstate3 = (targ2 - newstate2) ^ (newstate2 << 8);
      div = (newstate1 & 0x3f) + sum + c;
      diff = ((newstate3 ^ newstate1) - (newstate1 << 8)) & MASK;
      if (diff % div != 0) continue;
      d = diff / div;
      if (d < MIN_CHAR || d >; MAX_CHAR) continue;


      div = (newstate3 & 0x3f) + sum + c + d;
      diff = ((targ1 ^ newstate3) - (newstate3 << 8)) & MASK;
      if (diff % div != 0) continue;
      e = diff / div;
      if (e < MIN_CHAR || e >; MAX_CHAR) continue;


      pass_ary[i+1] = c;
      pass_ary[i+2] = d;
      pass_ary[i+3] = e;
      return 1;
    }


    while (i >;= 0 && pass_ary[i] >;= MAX_CHAR) {
      sum -= MAX_CHAR;
      i--;
    }
    if (i < 0) break;
    pass_ary[i]++;
    xor_ary[i] += step_ary[i];
    sum++;
    state1_ary[i+1] = state1_ary[i] ^ xor_ary[i];
    state2_ary[i+1] = state2_ary[i]
      + ((state2_ary[i] << 8) ^ state1_ary[i+1]);
  }


  return 0;
}


void crack(char *hash)
{
  int i, len;
  u32 targ1, targ2, targ3;
  int pass[MAX_LEN];


  if ( sscanf(hash, "%8lx%lx", &targ1, &targ2) != 2 ) {
    printf("Invalid password hash: %s\n", hash);
    return;
  }
  printf("Hash: %08lx%08lx\n", targ1, targ2);
  targ3 = targ2 - targ1;
  targ3 = targ2 - ((targ3 << 8) ^ targ1);
  targ3 = targ2 - ((targ3 << 8) ^ targ1);
  targ3 = targ2 - ((targ3 << 8) ^ targ1);


  for (len = 3; len <= MAX_LEN; len++) {
    printf("Trying length %d\n", len);
    if ( crack0(len-4, targ1, targ3, pass) ) {
      printf("Found pass: ");
      for (i = 0; i < len; i++)
        putchar(pass[i]);
      putchar('\n');
      break;
    }
  }
  if (len >; MAX_LEN)
    printf("Pass not found\n");
}


int main(int argc, char *argv[])
{
  int i;
  if (argc <= 1)
    printf("usage: %s hash\n", argv[0]);
  for (i = 1; i < argc; i++)
    crack(argv[i]);
  return 0;
}



ADDITIONAL INFORMATION


The information has been provided by Secret Squirrel.




========================================



This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com



====================
====================


DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

论坛徽章:
0
3 [报告]
发表于 2003-06-02 15:56 |只看该作者

MySQL密码遗忘解决方法zt

加密其实并不脆弱,一个8位的密码就足够你跑上一整天的了。破解mysql的密码更省事的就是替换mysql这个库 ^_^

论坛徽章:
5
荣誉会员
日期:2011-11-23 16:44:17CU大牛徽章
日期:2013-09-18 15:15:15CU大牛徽章
日期:2013-09-18 15:15:45未羊
日期:2014-02-25 14:37:19射手座
日期:2014-12-26 22:55:37
4 [报告]
发表于 2003-07-24 16:49 |只看该作者

MySQL密码遗忘解决方法zt

[quote]原帖由 "HeartIcy"]加密其实并不脆弱,一个8位的密码就足够你跑上一整天的了。破解mysql的密码更省事的就是替换mysql这个库 ^_^[/quote 发表:
     
替换整个库是比较愚蠢的方法,只需要在启动的时候用--skip-grant-tables再该或者只替换mysql库下面的user.*都比这个好

论坛徽章:
0
5 [报告]
发表于 2003-07-24 17:08 |只看该作者

MySQL密码遗忘解决方法zt

P,替换一个库只要删除复制;你那方法还要折腾这么多东西无聊。论省事是我的省事。小孩

论坛徽章:
5
荣誉会员
日期:2011-11-23 16:44:17CU大牛徽章
日期:2013-09-18 15:15:15CU大牛徽章
日期:2013-09-18 15:15:45未羊
日期:2014-02-25 14:37:19射手座
日期:2014-12-26 22:55:37
6 [报告]
发表于 2003-07-25 08:42 |只看该作者

MySQL密码遗忘解决方法zt

[quote]原帖由 "HeartIcy"]P,替换一个库只要删除复制;你那方法还要折腾这么多东西无聊。论省事是我的省事。小孩[/quote 发表:
     
得了吧,小子,就看一半,你自己用--skip-grant-tables进去改root密码就的了再重新启动,还说你的简单。人家原来建立的用户和相应对应各个表/库的权限还要全部重新建立一遍,你说谁简单?

没有想到你对MYSQL license一知半解,结果对于MYSQL的技术问题也是一样。

论坛徽章:
0
7 [报告]
发表于 2003-07-25 09:13 |只看该作者

MySQL密码遗忘解决方法zt

神经啊。。。。。我说的是破密码。。。。。删除复制小孩都会,谁简单。挣眼瞎子。还有我不知道你做没做过网管,有经验的管理员按照你的做法早晚玩死自己。

论坛徽章:
5
荣誉会员
日期:2011-11-23 16:44:17CU大牛徽章
日期:2013-09-18 15:15:15CU大牛徽章
日期:2013-09-18 15:15:45未羊
日期:2014-02-25 14:37:19射手座
日期:2014-12-26 22:55:37
8 [报告]
发表于 2003-07-25 09:33 |只看该作者

MySQL密码遗忘解决方法zt

[quote]原帖由 "HeartIcy"]神经啊。。。。。我说的是破密码。。。。。删除复制小孩都会,谁简单。挣眼瞎子。还有我不知道你做没做过网管,有经验的管理员按照你的做法早晚玩死自己。[/quote 发表:
     
哈哈,自己找了个这么麻烦得方法去破密码,被别人指出又更简单得绕过进去更改得方法就恼羞成怒成为这个德性。你得方式才是玩死自己得方法,把整个授权表或者库都破坏了,原来的授权都要全部重来。是啊你的方法是简单,可惜后续工作估计只有你才会简单。人家不过要对付密码遗忘了要怎么半,你顺便要别人还要把当场的各个用户的授权全部再来一遍,不错。下次你是否打算rm -rf *把mysql的所有数据都删除了重新来一遍呢?呵呵

论坛徽章:
0
9 [报告]
发表于 2003-07-25 09:43 |只看该作者

MySQL密码遗忘解决方法zt

屁 你那方法是手册里边800年就有了,光一个命令能证明什么?不懂认证方式的还以为是什么GOD模式呢!

第二个恢复方法是逆算HASH密码,我不说清楚怕被人(你不是人,没说你)误解MySQL密码认证很脆弱。

有些[兽、禽兽不如和衣冠禽兽]自己想不出来我这种方法妒忌我,我看才是真的呢。。。

论坛徽章:
5
荣誉会员
日期:2011-11-23 16:44:17CU大牛徽章
日期:2013-09-18 15:15:15CU大牛徽章
日期:2013-09-18 15:15:45未羊
日期:2014-02-25 14:37:19射手座
日期:2014-12-26 22:55:37
10 [报告]
发表于 2003-07-25 09:48 |只看该作者

MySQL密码遗忘解决方法zt

[quote]原帖由 "HeartIcy"]不如和衣冠禽兽]自己想不出来我这种方法妒忌我,我看才是真的呢。。。[/quote 发表:
     
呵呵,你自己要别人覆盖整个mysql库,现在装傻不认,你当然可以把自己的那篇给删除了,就可以掩耳盗铃咯。
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP