If it's 10g, it's very possible they're using dbms_crypto to encrypt some piece of data. You seed it with your own random string of varying lengths. You basically create a wrapper package for the built-in dbms_crypto package. Depending on the length of your seed, you'll get different length results. You'd have to guess their seed, though - for this info to do you any good. And, unless you have access to the database server, I'm thinking that's highly unlikely.
However, depending on how carefully they wrote their wrapper proc, you might be able to guess the decrypt function to call. Not that I advocate that kind of behavior or anything. On 4/11/06, jonese <[EMAIL PROTECTED]> wrote: > > I'm trying to reverse engineer a hash and i'm not sure what could > product something like this: > > 931c6ff8d9e365bfb412 > > the value returned by this system is always 20 chars in length and > only consists of letters and numbers. > > no i have no idea what it is but i'm trying to reverse engineer it to > see if i can recreate it. > > Anyone know what could create a 20 char hash? if it helps at all this > is coming from an Oracle 10G server. > > jonese > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Message: http://www.houseoffusion.com/lists.cfm/link=i:4:237476 Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4 Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4 Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4 Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

