Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

how to decrypt password

Former Member
0 Kudos

how to decrypt password in <b>usr02</b> table

1 ACCEPTED SOLUTION

eddy_declercq
Active Contributor
0 Kudos

Hi,

I think that the passwd in that table aren't meant to be decrypted.

Eddy

-


PS. Which type of SDN Ubergeek/BPX suit are <a href="/people/eddy.declercq/blog/2007/05/14/which-type-of-sdn-ubergeekbpx-suit-are-you">you</a>?

4 REPLIES 4

eddy_declercq
Active Contributor
0 Kudos

Hi,

I think that the passwd in that table aren't meant to be decrypted.

Eddy

-


PS. Which type of SDN Ubergeek/BPX suit are <a href="/people/eddy.declercq/blog/2007/05/14/which-type-of-sdn-ubergeekbpx-suit-are-you">you</a>?

Former Member
0 Kudos

Hello,

naturally the password is stored in the database using a one-way hash. There is no decrypt-algorithm which can be used to decrypt such an hash value.

Regards, Uwe

Former Member
0 Kudos

The passwords in USR02 are scrambled by a one way hash function. Given enough computing power you could possibly brute-force it but given the time required to run the permutations it is probably easier to ask the administrator to reset the password.

Considering how many people have access to SE16 and usually USR02, it's important for there to be a higher than trivial protection on the passwords.

Former Member
0 Kudos

Yes it is a one way hash to the passwords that are stored in USR02 however in versions 4.6 and below it's relatively easy to brute for the passwords.

This is due to the following:

Passwords hash values are stored in tables which are viewable by many users in the system.

Not case sensitive up to version 4.6

Limited to 8 uppercase characters up to version 4.6

The hash algorithms are week up to version 4.6.

There are many back doors into an SAP system. Depending on authorization level there are ways to write and execute code undetected.

The dictionary and brute for attacks are not detected by the system and thus will not set-off a warning or lock the user (if written correctly).

There is a plug in to a popular password cracking program for SAP--although it's not generally available.

After SAP NetWeaver 6.40, the password hash algorithm will be changed from MD5 to SHA-1 and there are a large number of other password related changes that make new versions much more difficult to crack/hack.

Cheers,

Ben