Redgate Oracle crack.rar
Закачек 943
Средняя скорость 9396 Kb/s
Скачать

Redgate Oracle crack

Полного источника не было: 1 месяц 4 дня

Пол:

Стаж: 2 года 6 месяцев

22-Апр-2016 05:00

REDGATE DEVELOPMENT BUNDLE 2015 (FOR SQL / .NET / ORACLE)

Год/Дата Выпуска : 2014

Версия : 1.8.2 Build 487

Разработчик : Red Gate Software

Сайт разработчика : _www.red-gate.com/products/

Разрядность : 32bit, 64bit

Язык интерфейса : Английский

Windows Vista, Windows 7,Windows 10, Windows Server 2003, Windows Server 2008, Windows Server 2012

SQL Server 2005, 2008, 2008 R2, 2012, 2014, SQL Azure, or SQL Server on Amazon RDS

Microsoft .NET Framework 3.5 SP1 or later

200 MB hard disk space

Minimum screen resolution of 1024×768

Runs on a user’s PC (can also run on a server)

Red Gate SQL Developer Bundle – данное решение представляет собой набор из 10 инструментов, которые позволяют разработчикам баз данных усовершенствовать процесс создания базы данных на каждой его стадии – от разработки БД до тестирования и развертывания.

Red Gate SQL Developer Bundle содержит следующие компоненты:

SQL Compare Pro – служит для сравнения и синхронизации схем базы данных SQL сервера

SQL Data Compare Pro – программа для сравнения и синхронизация содержимого БД SQL сервера

SQL Prompt Pro – запись, обзор SQL и их редактирование

SQL Source Control – используется для подключения имеющейся системы управления версиями к серверу SQL

SQL Packager – с ее помощью вы можете комплектовать БД для развертывания или обновления

SQL Data Generator – генерирование тестовых данных для БД сервера SQL

SQL Dependency Tracker – позволяет визуализировать зависимости объектов сервера SQL

SQL Multi Script – реализация исполнения сценария на нескольких серверах с помощью одного клика мыши

SQL Doc – документирование БД сервера SQL

Программное обеспечение Red Gate Deployment Suite for Oracle – это система простого, быстрого и точного развертывания баз данных Oracle. Решение Red Gate Deployment Suite for Oracle представляет собой комплект из модулей Schema Compare for Oracle, Data Compare for Oracle и Schema Doc for Oracle 1.0 (Beta), разработанный для усовершенствования процессов сравнения и развертывания баз данных Oracle в средах разработки, тестирования и внедрения, а также для упрощения процедуры документирования баз данных.

Компоненты пакета Red Gate Deployment Suite for Oracle предоставляют пользователям доступ к функциям безошибочного и мощного развертывания схем и содержимого для баз данных Oracle наряду с возможностями автоматического документирования баз данных.

Компоненты Red Gate Deployment Suite for Oracle:

Schema Compare for Oracle – сопоставление и развертывание схем баз данных.

Data Compare for Oracle – сравнение и миграция содержимого баз данных.

Schema Doc for Oracle – автоматическая генерация документации баз данных

Red Gate .NET Developer Bundle – это программное обеспечение предоставляет разработчикам и тестировщикам полный набор инструментов для отладки .NET-кода и оптимизации производительности. В первую очередь пакет Red Gate .NET Developer Bundle рассчитан на разработчиков и тестировщиков программного обеспечения на платформе .NET. Используя данное решение, пользователи могут выполнять проверку качества выпускаемого ПО, вовремя завершать проекты по разработке, а также стандартизировать управление производительностью для всей команды разработчиков. Пакет включает в себя приложения ANTS Performance Profiler Pro, .NET Reflector VSPro и ANTS Memory Profiler.

SQL DBA Bundle — это набор инструментов для администраторов баз данных SQL-сервера. SQL DBA Bundle осуществляет сжатие и шифрование резервных копий, создание баз данных из резервных копий, анализ активности SQL-сервера и развертывание на нем сценариев.

Разработчик: Red Gate Software

Платформа: Microsoft Windows

Совместимость с Vista: полная

Windows 2000, Windows XP, Windows 2003 Server, Windows Vista, Windows 7

SQL Server client tools

SQL Server Management Studio, SQL Server Management Studio Express, Query Analyzer или Visual Studio 2005

Microsoft .NET Framework 2.0

256 MB RAM (рекомендуется >512 MB)

100 MB дискового пространства

Язык интерфейса: только английский

1) ANTS Memory Profiler 5.1.0.15

2) ANTS Performance Profiler 5.2.0.26

3) Exception Hunter 2.1.0.2

4) PInvoke Visual Studio Add-in 1.1.0.7

5) SQL Backup 6.3.0.48

6) SQL Backup Server Components 6.3.0.48

7) SQL Compare 8.1.0.360

8) SQL Comparison SDK 8.0.1.8

9) SQL Data Compare 8.0.2.5

10) SQL Data Generator 1.2.0.286

11) SQL Dependency Tracker 2.5.0.558

12) SQL Doc 2.0.0.733

13) SQL Multi Script 1.1.0.34

14) SQL Packager 6.0.0.107

15) SQL Prompt 4.0.3.12

16) SQL Refactor 1.5.1.31

17) SQL Response 1.3.0.58

18) SQL Response Alert Repository 1.3.0.58

19) SQL Object Level Recovery Native 1.1.0.32

20) .NET Reflector 6.1.0.11

21) SQL Search 1.0.0.308

Что не получилось у меня:

1) не разобрался с SQL Response — внизу экрана пишет «14 дней» и кошка не ходи. Куда вводить код не знаю. Буду рад, если кто-то подскажет

2) SQL Backup также пишет ограничения, хотя зарегистрировался на ура через Keygen (через сервер регистрировался только на 14 дней)

I have written an Oracle password cracker in PL/SQL. Why should I do this, you may ask? — well I wanted to have a password cracker that would be easy and simple to run. It doesn’t necessarilly need to be fast and it doesn’t need to replace excellent password crackers such as woraauthbf. What i wanted was to promote the need to check for weak passwords in customer databases but allow the customer to have a safe and easy method to do it that doesn’t involve downloading binaries, oracle clients, ssl dlls and more. I wanted it to be as easy as possible for people to at least do a high level check of password strength.

Then there is no excuse to not do it. This method is as simple as running a sqlplus script, no more, no less, no libraries, nothing. Just fire up SQL*Plus and type @cracker-v2.0.sql and it runs and checks passwords. That said there is still value in real password crackers as they are faster and can check mopre complex and longer passwords. The PL/SQL cracker can get the basics done for you easily and will show where you are on the scale of password weakness. If you can run cracker-v2.0.sql and it doesnt crack any passwords then you are on the road to success and more importantly you will have started a regime in your company of password cracking. So moving to a tool such as woraauthbf is easier for you to do to check strength to a better level.

All of the sites I audit will (would have) failed using cracker-v2.0.sql so its worth running it, period. The speed is still not bad as it does around 13,000 hash attempts per second. I have seen it do 16,000 hashes a second as well. This is not woraauthbf of course that does 1.2Million hashes a second on my laptop BUT as i said cracker-v2.0.sql will find the key issues for you as well as woraauthbf.

Of course the other major advantage to PL/SQL is that you can simply read the code and see how it works and also because it runs in the database you can be sure to block any danger by designing the privileges of the user who will run it to be the minimum necessary. This at present is CREATE SESSION, SELECT ON SYS.USER$ and EXECUTE ON DBMS_OBFUSCATION_TOOLKIT.

The cracker works on 9i (r1 and r2), 10g (r1 and r2) and 11gR1. I dont have 8i to test with but i assume it ewill work.

The cracker is very simple to run as you can see above. It runs pretty fast, in the sample 11gR1 database I tested with above its testing 57 user accounts and also roles that have had passwords assigned. In this case 3 passwords could not be cracked as they had been set to impossible passwords (These are where the password hash is not a valid hash, i.e. they have been set with the undocumented ALTER USER IDENTIFIED BY VALUES command). One further password could not be cracked as it is identified as being externally authenticated or a GLOBAL password (such as those authenticated by OID). Of the rest, in this example only 7 passwords were not cracked. This gives a percentage of 87% of passwords were cracked easily, in other words the passwords had very weak settings. This unfortunately is something I see regularly on real production systems. This emphasises why a simple PL/SQL based tool has value and the fast C based tools should be used later.

OK, so what does the tool do. It first checks which accounts it cannot crack. It then tries to crack users accounts and roles with passwords. The type is identified in the first column, a value of ‘U’ser or ‘R’ole is set. The next column is the username or rolename. The next column is the cracked password or blank if the password was not cracked. If the password hash is an impossible one as described above then the password column has [IMP ]. If the password is GLOBAL or EXTERNAL then the password column shows [GL-EX ] for a GLOBAL password, for instance. Another possible setting for the password column is [HASH ]. This is output for cases where the password hash is a known default BUT we dont know what the password is. This should still be changed of course.

The columns after the password are as follows. The first column is the method with which the password was cracked. The first check is for ‘DE’fault passwords. The second check is ‘PU’ which means the password is set to the username. The third check is ‘DI’ctionary where the password is set to a dictionary word. The final check is ‘BF’ which means the password was brute forced.

Of course the values for the above conditions, ‘IM’ for Impossible, ‘GE’ for GLOBAL/EXTERNAL and ‘HS’ for hash are also output. Any row that has ‘—‘ means the password was not cracked. The next column seems redundant as it shows ‘—‘ for not cracked or ‘CR’ for cracked passwords but I added this to use awk to pull out the lines more easily. The final column is the account status. The values can be seen in the code, but OP means Open and EL means Expired/Locked for instance.

A few notes: The brute force mode is hard coded to a length of 4 characters at the moment (you can change this of course) as this takes around 35 seconds for a single password for the character set used. You can change the character set to alpha, alpha/num or alpha/num/+specials by changing the length from 26 to 36 to 39 respectively. You can also add bigger character sets.

The driving select in the pre_load function can also be changed to read user_history$ for instance or to check a subset of users or roles by changing the where clause.

The dictionary included is pretty small, you can add your own dictionary words easily. I have added around 2000 in my own copy but have refrained from including them here as I simply cannot find where I got them from.

The code includes a trace/debug interface. To turn on debug if there is a problem, uncomment the debugw calls and turn on the debug at the top of the file. This would only be needed if you find a bug, if you can reproduce you can send me a trace file to be able to fix the issues.

If anyone has requests, ideas for improvement please ask me and i will try and add them. Send an email to to Pete Finnigan.


Статьи по теме