1.
|
What MySQL versions are supported by the program? |
|
The program supports data import and recovery of MySQL 4.1, 5.0, 5.1, 5.5, 5.6, 5.7, 8.0 passwords.
|
2.
|
What are system requirements? |
|
System requirements:
- any operating system with Oracle JRE 10 installed;
- minimum of 1 Gb RAM;
- free 18 Mb hard disk space (plus the space required for JRE installation);
- minimum of 800x600 screen resolution.
|
3.
|
What access rights are required for importing data from a database? |
|
The source data for password recovery is stored in the database mysql .
Only the user root has the required access by default.
To import the data, specify either user root or one of the users
with access to this data.
|
4.
|
What formats of rainbow tables are supported by the program? |
|
The program supports RT, RTI and
RTI2 formats.
|
5.
|
What accounts can be used with rainbow tables? |
|
The salt is used in the algorithms for calculating SHA-256 and SHA-2 hashes.
Thus, it is ineffective to create rainbow tables files.
The user name and the salt are not used in the algorithms for calculating
323 and SHA-1 hashes.
Use any accounts with rainbow tables.
Small rainbow tables supplied with the program can recover passwords:
- comprised of Latin characters in lower case only;
- 1 to 4 characters long.
|
6.
|
Where to find rainbow tables? |
|
There are two ways to obtain rainbow tables:
-
Download existing rainbow tables files for MySQL.
For example, use MySQL SHA-1 rainbow tables files
from the Password Crackers site.
-
A program called Winrtgen
can be used for creating rainbow tables.
Specify the following to generate files:
-
hash type:
mysql323 or
mysqlsha1 ;
- possible length of the password;
- character set.
To check the efficiency of rainbow tables, use the mysql-users5.txt file
containing records with passwords of various lengths.
|
7.
|
What are the limitations of the evaluation version? |
|
The evaluation version has the following functional limitations:
- only the first character of the recovered password is shown;
- for hybrid attack, the quantity of added characters is limited;
- the total size of the rainbow table files is limited;
- the character set is limited to A-Z characters;
- for brute force attack, the possible maximum password length is limited.
|