Author Topic: Decrypt Person Passord  (Read 1487 times)

Offline DANIEL.DOUSSET

  • Newbie
  • *
  • Posts: 4
  • Karma: 0
Decrypt Person Passord
« on: March 02, 2021, 10:45:02 PM »
Hello i'm writin a programme to copy Person config from an install of Genesys to a new install.
I arrive to read all information but the password is crypted and i don't found a function to decrypt this password for the new person in the new config.

                    objects = confService.retrieveObject(ICfgObject.class, myQuery);
                    CfgPerson thePerson=(CfgPerson)objects;   
                    int passwordHashAlgorithm=thePerson.getPasswordHashAlgorithm();
                    String password=thePerson.getPassword();

I obtain those informations but i can't find how decrypt  their.

'password' [str] = "C221F5B008E433C8445D500894D54104FDB108A3CB265E716717538B69FE73E2"
'passwordHashAlgorithm' [int] = 1

Can you help me ?
Thank you



Offline René

  • Administrator
  • Hero Member
  • *****
  • Posts: 1822
  • Karma: 60
Re: Decrypt Person Passord
« Reply #1 on: March 03, 2021, 05:33:42 PM »
Hi Daniel,

As far as I know password stored in Genesys Configuration DB is not password itself (even encrypted) but its hash. It means you cannot retrieve (recover) password from configuration.

Please see 'Password Encryption' section for more details - https://docs.genesys.com/Documentation/System/8.5.x/SDG/UserPswds

R.

Offline hsujdik

  • Hero Member
  • *****
  • Posts: 501
  • Karma: 23
Re: Decrypt Person Passord
« Reply #2 on: March 03, 2021, 09:31:26 PM »
Hi Daniel,

As far as I know password stored in Genesys Configuration DB is not password itself (even encrypted) but its hash. It means you cannot retrieve (recover) password from configuration.

Please see 'Password Encryption' section for more details - https://docs.genesys.com/Documentation/System/8.5.x/SDG/UserPswds

R.

Yes, that is correct.

In 8+ framework the password is Hashed AND Salted. This cannot be reversed and is the security method for storing password hashes used by most of the systems.

However, up to 7.6, the password is only hashed in MD5 format (not salted). That means that, if you are trying to recover the password from a very old environment (up to 7.6), you might be able to do so by pasting the hash in a large online MD5 database and hope they have it reversed.

Offline DANIEL.DOUSSET

  • Newbie
  • *
  • Posts: 4
  • Karma: 0
Re: Decrypt Person Passord
« Reply #3 on: March 04, 2021, 04:20:06 PM »
Thank you for your's answers
In this case, i put the username as password and force to change

Offline orel

  • Newbie
  • *
  • Posts: 2
  • Karma: 0
Re: Decrypt Person Passord
« Reply #4 on: September 02, 2022, 01:33:37 AM »
Hello,

I am trying to find out the way passwords are secured. It seems like the Password column is equal to sha256(cleartextpassword,SALTED_STRING).
But i cannot compute it successfully on an example with known cleartext password.
Would you mind sharing the code snipet ? Maybe the SALTED_STRING is not fully taken into account.

Kind Regards.