l On line data archive query
It is a small SQL script to serve as a sort of password cracker for SQLite databases which might contain sensitive data.
Django Hacker News and Slashdot have more than just text and binary data. Hacker News and Slashdot have files of various types, like semi-compressed binaries,.tif files, that they are running on. Using sqlite3 a password is a hash of a password. If it is very similar to the stored password, the hash is very likely to be the same. Sqlite doesn’t support bitwise operations, but you can use either bitwise or string based comparison methods.
What do we want?
We want to be able to recover the hash from the database.
How do we get it?
We just need to know the password.
How much will it cost?
I don’t have a device, can I still try it?
Yes, you can use a console application, or a windows service to get this done.
l What is the output?
We create an empty password database (password.db) and use a sqlite3 command line tool to see what happens.
How to use it?
Here is some code that will create a password hash database and use sqlite3 to recover the hash. You can use that as is and you may need to modify some parameters.
What does it do?
It creates a database and an empty password hash. Then it stores the hash in the database and retrieves the hash to see if it matches the stored hash.
How does it work?
It just retrieves the stored hash from the password database and compares it to the password.
How do I use it?
Simply run the program with the password you want to crack.
sqlite3.exe is a sqlite3 command line tool. If you have it already installed, it is under c:\sqlite\ sqlite3.exe.
The password database is password.db. It contains a hash of the password. It is always 256 bytes (32 bits or 32 bytes).
You can crack a 32 bit hash in one second. So you should be able to crack a 256 bit hash in a second or two