EnglishSpanishGermanFrenchPortugueseItalianRussian

FAQ

1. What MySQL versions are supported by the program?
2. What are system requirements?
3. What access rights are required for importing data from a database?
4. What formats of rainbow tables are supported by the program?
5. What accounts can be used with rainbow tables?
6. Where to find rainbow tables?
7. What are the limitations of the evaluation version?

1.

What MySQL versions are supported by the program?

The program supports data import and recovery of MySQL 4.1, 5.0, 5.1, 5.5, 5.6, 5.7 passwords.

2.

What are system requirements?

System requirements:

  • any operating system with Oracle JRE 8 installed;
  • minimum of 1 Gb RAM;
  • free 18 Mb hard disk space (plus the space required for JRE installation);
  • minimum of 800x600 screen resolution.

3.

What access rights are required for importing data from a database?

The source data for password recovery is stored in the database mysql. Only the user root has the required access by default.

To import the data, specify either user root or one of the users with access to this data.

4.

What formats of rainbow tables are supported by the program?

The program supports RT, RTI and RTI2 formats.

5.

What accounts can be used with rainbow tables?

The user name is not used in the algorithms for calculating MySQL passwords hashes. Use any accounts with rainbow tables.

Small rainbow tables supplied with the program can recover passwords:

  • comprised of Latin characters in lower case only;
  • 1 to 4 characters long.

6.

Where to find rainbow tables?

There are two ways to obtain rainbow tables:

  1. Download existing rainbow tables files for MySQL. For example, use MySQL SHA-1 rainbow tables files from the Password Crackers site.
  2. A program called Winrtgen can be used for creating rainbow tables. Specify the following to generate files:
    • hash type: mysql323 or mysqlsha1;
    • possible length of the password;
    • character set.

To check the efficiency of rainbow tables, use the mysql-users5.txt file containing records with passwords of various lengths.

7.

What are the limitations of the evaluation version?

The evaluation version has the following functional limitations:

  • only the first character of the recovered password is shown;
  • for hybrid attack, the quantity of added characters is limited;
  • the total size of the rainbow table files is limited;
  • the character set is limited to A-Z characters;
  • for brute force attack, the possible maximum password length is limited.