Decrypting passwords in dsx files

A forum for discussing DataStage<sup>®</sup> basics. If you're not sure where your question goes, start here.

Moderators: chulett, rschirm, roy

Post Reply
PhilHibbs
Premium Member
Premium Member
Posts: 1044
Joined: Wed Sep 29, 2004 3:30 am
Location: Nottingham, UK
Contact:

Decrypting passwords in dsx files

Post by PhilHibbs »

Does anyone have anything better than this for decoding the passwords in dsx files? Some codes are missing from the list.
Phil Hibbs | Capgemini
Technical Consultant
eostic
Premium Member
Premium Member
Posts: 3838
Joined: Mon Oct 17, 2005 9:34 am

Post by eostic »

Why? Not to be sarcastic, but really to understand the business reason? Did someone lose the pwd?.....and which pwd is it? One for a db connection?

Ernie
Ernie Ostic

blogit!
<a href="https://dsrealtime.wordpress.com/2015/0 ... ere/">Open IGC is Here!</a>
PhilHibbs
Premium Member
Premium Member
Posts: 1044
Joined: Wed Sep 29, 2004 3:30 am
Location: Nottingham, UK
Contact:

Post by PhilHibbs »

Yes, someone did lose a password for a database connection. I got it back using that list, but there were a couple of letter codes missing that I had to guess.
Phil Hibbs | Capgemini
Technical Consultant
Sainath.Srinivasan
Participant
Posts: 3337
Joined: Mon Jan 17, 2005 4:49 am
Location: United Kingdom

Post by Sainath.Srinivasan »

We have our own password decrypter.

But it may be worth checking replacing the encrypted password into a parameter set password value and moving that to a string to print in the log.
PhilHibbs
Premium Member
Premium Member
Posts: 1044
Joined: Wed Sep 29, 2004 3:30 am
Location: Nottingham, UK
Contact:

Post by PhilHibbs »

I have re-created the list that I linked in my first post, as it had some issues with < characters being interpreted as HTML tags. To use this chart to decode a password, just search for each three-character chunk of the encoded password, and the line that it is found on is the character that it represents. This is good for up to 20 characters of password, as each successive three-character group is what that character will be encoded as in that position. So, "abc" becomes "LD8@1HV@N".

Code: Select all

0 HL9 D9J RHM =3= 4O6 M4J N<@ OAG F<> IM0 Q<B QKL oF; `NC U71 TG; LE@ dO6 5F6 A8L
1 HL8 D9K RHL =3< 4O7 M4K N<A OAF F<? IM1 Q<C QKM oF: `NB U70 TG: LEA dO7 5F7 A8M
2 HL; D9H RHO =3? 4O4 M4H N<B OAE F<< IM2 Q<@ QKN oF9 `NA U73 TG9 LEB dO4 5F4 A8N
3 HL: D9I RHN =3> 4O5 M4I N<C OAD F<= IM3 Q<A QKO oF8 `N@ U72 TG8 LEC dO5 5F5 A8O
4 HLI D9: RH= =3M 4OF M4: N<0 OA7 F<N IM@ Q<2 QK< oFK `N3 U7A TGK LE0 dOF 5FF A8<
5 HLH D9; RH< =3L 4OG M4; N<1 OA6 F<O IMA Q<3 QK= oFJ `N2 U7@ TGJ LE1 dOG 5FG A8=
6 HLK D98 RH? =3O 4OD M48 N<2 OA5 F<L IMB Q<0 QK> oFI `N1 U7C TGI LE2 dOD 5FD A8>
7 HLJ D99 RH> =3N 4OE M49 N<3 OA4 F<M IMC Q<1 QK? oFH `N0 U7B TGH LE3 dOE 5FE A8?
8 HM9 D8J RIM =2= 4N6 M5J N=@ O@G F=> IL0 Q=B QJL oG; `OC U61 TF; LD@ dN6 5G6 A9L
9 HM8 D8K RIL =2< 4N7 M5K N=A O@F F=? IL1 Q=C QJM oG: `OB U60 TF: LDA dN7 5G7 A9M
a LD8 @1K V@L 9;< 0G7 I<K J4A KIF B4? ME1 U4C UCM kN: dFB Q?0 PO: HMA `G7 1N7 E0M
b LD; @1H V@O 9;? 0G4 I<H J4B KIE B4< ME2 U4@ UCN kN9 dFA Q?3 PO9 HMB `G4 1N4 E0N
c LD: @1I V@N 9;> 0G5 I<I J4C KID B4= ME3 U4A UCO kN8 dF@ Q?2 PO8 HMC `G5 1N5 E0O
d LDI @1: V@= 9;M 0GF I<: J40 KI7 B4N ME@ U42 UC< kNK dF3 Q?A POK HM0 `GF 1NF E0<
e LDH @1; V@< 9;L 0GG I<; J41 KI6 B4O MEA U43 UC= kNJ dF2 Q?@ POJ HM1 `GG 1NG E0=
f LDK @18 V@? 9;O 0GD I<8 J42 KI5 B4L MEB U40 UC> kNI dF1 Q?C POI HM2 `GD 1ND E0>
g LDJ @19 V@> 9;N 0GE I<9 J43 KI4 B4M MEC U41 UC? kNH dF0 Q?B POH HM3 `GE 1NE E0?
h LE9 @0J VAM 9:= 0F6 I=J J5@ KHG B5> MD0 U5B UBL kO; dGC Q>1 PN; HL@ `F6 1O6 E1L
i LE8 @0K VAL 9:< 0F7 I=K J5A KHF B5? MD1 U5C UBM kO: dGB Q>0 PN: HLA `F7 1O7 E1M
j LE; @0H VAO 9:? 0F4 I=H J5B KHE B5< MD2 U5@ UBN kO9 dGA Q>3 PN9 HLB `F4 1O4 E1N
k LE: @0I VAN 9:> 0F5 I=I J5C KHD B5= MD3 U5A UBO kO8 dG@ Q>2 PN8 HLC `F5 1O5 E1O
l LEI @0: VA= 9:M 0FF I=: J50 KH7 B5N MD@ U52 UB< kOK dG3 Q>A PNK HL0 `FF 1OF E1<
m LEH @0; VA< 9:L 0FG I=; J51 KH6 B5O MDA U53 UB= kOJ dG2 Q>@ PNJ HL1 `FG 1OG E1=
n LEK @08 VA? 9:O 0FD I=8 J52 KH5 B5L MDB U50 UB> kOI dG1 Q>C PNI HL2 `FD 1OD E1>
o LEJ @09 VA> 9:N 0FE I=9 J53 KH4 B5M MDC U51 UB? kOH dG0 Q>B PNH HL3 `FE 1OE E1?
p LL9 @9J VHM 93= 0O6 I4J J<@ KAG B<> MM0 U<B UKL kF; dNC Q71 PG; HE@ `O6 1F6 E8L
q LL8 @9K VHL 93< 0O7 I4K J<A KAF B<? MM1 U<C UKM kF: dNB Q70 PG: HEA `O7 1F7 E8M
r LL; @9H VHO 93? 0O4 I4H J<B KAE B<< MM2 U<@ UKN kF9 dNA Q73 PG9 HEB `O4 1F4 E8N
s LL: @9I VHN 93> 0O5 I4I J<C KAD B<= MM3 U<A UKO kF8 dN@ Q72 PG8 HEC `O5 1F5 E8O
t LLI @9: VH= 93M 0OF I4: J<0 KA7 B<N MM@ U<2 UK< kFK dN3 Q7A PGK HE0 `OF 1FF E8<
u LLH @9; VH< 93L 0OG I4; J<1 KA6 B<O MMA U<3 UK= kFJ dN2 Q7@ PGJ HE1 `OG 1FG E8=
v LLK @98 VH? 93O 0OD I48 J<2 KA5 B<L MMB U<0 UK> kFI dN1 Q7C PGI HE2 `OD 1FD E8>
w LLJ @99 VH> 93N 0OE I49 J<3 KA4 B<M MMC U<1 UK? kFH dN0 Q7B PGH HE3 `OE 1FE E8?
x LM9 @8J VIM 92= 0N6 I5J J=@ K@G B=> ML0 U=B UJL kG; dOC Q61 PF; HD@ `N6 1G6 E9L
y LM8 @8K VIL 92< 0N7 I5K J=A K@F B=? ML1 U=C UJM kG: dOB Q60 PF: HDA `N7 1G7 E9M
z LM; @8H VIO 92? 0N4 I5H J=B K@E B=< ML2 U=@ UJN kG9 dOA Q63 PF9 HDB `N4 1G4 E9N
A L48 @AK V0L 9K< 077 ILK JDA K9F BD? M51 UDC U3M k>: d6B QO0 P?: H=A `77 1>7 E@M
B L4; @AH V0O 9K? 074 ILH JDB K9E BD< M52 UD@ U3N k>9 d6A QO3 P?9 H=B `74 1>4 E@N
C L4: @AI V0N 9K> 075 ILI JDC K9D BD= M53 UDA U3O k>8 d6@ QO2 P?8 H=C `75 1>5 E@O
D L4I @A: V0= 9KM 07F IL: JD0 K97 BDN M5@ UD2 U3< k>K d63 QOA P?K H=0 `7F 1>F E@<
E L4H @A; V0< 9KL 07G IL; JD1 K96 BDO M5A UD3 U3= k>J d62 QO@ P?J H=1 `7G 1>G E@=
F L4K @A8 V0? 9KO 07D IL8 JD2 K95 BDL M5B UD0 U3> k>I d61 QOC P?I H=2 `7D 1>D E@>
G L4J @A9 V0> 9KN 07E IL9 JD3 K94 BDM M5C UD1 U3? k>H d60 QOB P?H H=3 `7E 1>E E@?
H L59 @@J V1M 9J= 066 IMJ JE@ K8G BE> M40 UEB U2L k?; d7C QN1 P>; H<@ `66 1?6 EAL
I L58 @@K V1L 9J< 067 IMK JEA K8F BE? M41 UEC U2M k?: d7B QN0 P>: H<A `67 1?7 EAM
J L5; @@H V1O 9J? 064 IMH JEB K8E BE< M42 UE@ U2N k?9 d7A QN3 P>9 H<B `64 1?4 EAN
K L5: @@I V1N 9J> 065 IMI JEC K8D BE= M43 UEA U2O k?8 d7@ QN2 P>8 H<C `65 1?5 EAO
L L5I @@: V1= 9JM 06F IM: JE0 K87 BEN M4@ UE2 U2< k?K d73 QNA P>K H<0 `6F 1?F EA<
M L5H @@; V1< 9JL 06G IM; JE1 K86 BEO M4A UE3 U2= k?J d72 QN@ P>J H<1 `6G 1?G EA=
N L5K @@8 V1? 9JO 06D IM8 JE2 K85 BEL M4B UE0 U2> k?I d71 QNC P>I H<2 `6D 1?D EA>
O L5J @@9 V1> 9JN 06E IM9 JE3 K84 BEM M4C UE1 U2? k?H d70 QNB P>H H<3 `6E 1?E EA?
P L<9 @IJ V8M 9C= 0?6 IDJ JL@ K1G BL> M=0 ULB U;L k6; d>C QG1 P7; H5@ `?6 166 EHL
Q L<8 @IK V8L 9C< 0?7 IDK JLA K1F BL? M=1 ULC U;M k6: d>B QG0 P7: H5A `?7 167 EHM
R L<; @IH V8O 9C? 0?4 IDH JLB K1E BL< M=2 UL@ U;N k69 d>A QG3 P79 H5B `?4 164 EHN
S L<: @II V8N 9C> 0?5 IDI JLC K1D BL= M=3 ULA U;O k68 d>@ QG2 P78 H5C `?5 165 EHO
T L<I @I: V8= 9CM 0?F ID: JL0 K17 BLN M=@ UL2 U;< k6K d>3 QGA P7K H50 `?F 16F EH<
U L<H @I; V8< 9CL 0?G ID; JL1 K16 BLO M=A UL3 U;= k6J d>2 QG@ P7J H51 `?G 16G EH=
V L<K @I8 V8? 9CO 0?D ID8 JL2 K15 BLL M=B UL0 U;> k6I d>1 QGC P7I H52 `?D 16D EH>
W L<J @I9 V8> 9CN 0?E ID9 JL3 K14 BLM M=C UL1 U;? k6H d>0 QGB P7H H53 `?E 16E EH?
X L=9 @HJ V9M 9B= 0>6 IEJ JM@ K0G BM> M<0 UMB U:L k7; d?C QF1 P6; H4@ `>6 176 EIL
Y L=8 @HK V9L 9B< 0>7 IEK JMA K0F BM? M<1 UMC U:M k7: d?B QF0 P6: H4A `>7 177 EIM
Z L=; @HH V9O 9B? 0>4 IEH JMB K0E BM< M<2 UM@ U:N k79 d?A QF3 P69 H4B `>4 174 EIN
  HD9 D1J R@M =;= 4G6 M<J N4@ OIG F4> IE0 Q4B QCL oN; `FC U?1 TO; LM@ dG6 5N6 A0L
! HD8 D1K R@L =;< 4G7 M<K N4A OIF F4? IE1 Q4C QCM oN: `FB U?0 TO: LMA dG7 5N7 A0M
" HD; D1H R@O =;? 4G4 M<H N4B OIE F4< IE2 Q4@ QCN oN9 `FA U?3 TO9 LMB dG4 5N4 A0N
# HD: D1I R@N =;> 4G5 M<I N4C OID F4= IE3 Q4A QCO oN8 `F@ U?2 TO8 LMC dG5 5N5 A0O
$ HDI D1: R@= =;M 4GF M<: N40 OI7 F4N IE@ Q42 QC< oNK `F3 U?A TOK LM0 dGF 5NF A0<
% HDH D1; R@< =;L 4GG M<; N41 OI6 F4O IEA Q43 QC= oNJ `F2 U?@ TOJ LM1 dGG 5NG A0=
' HDJ D19 R@> =;N 4GE M<9 N43 OI4 F4M IEC Q41 QC? oNH `F0 U?B TOH LM3 dGE 5NE A0?
( HE9 D0J RAM =:= 4F6 M=J N5@ OHG F5> ID0 Q5B QBL oO; `GC U>1 TN; LL@ dF6 5O6 A1L
) HE8 D0K RAL =:< 4F7 M=K N5A OHF F5? ID1 Q5C QBM oO: `GB U>0 TN: LLA dF7 5O7 A1M
* HE; D0H RAO =:? 4F4 M=H N5B OHE F5< ID2 Q5@ QBN oO9 `GA U>3 TN9 LLB dF4 5O4 A1N
+ HE: D0I RAN =:> 4F5 M=I N5C OHD F5= ID3 Q5A QBO oO8 `G@ U>2 TN8 LLC dF5 5O5 A1O
, HEI D0: RA= =:M 4FF M=: N50 OH7 F5N ID@ Q52 QB< oOK `G3 U>A TNK LL0 dFF 5OF A1<
- HEH D0; RA< =:L 4FG M=; N51 OH6 F5O IDA Q53 QB= oOJ `G2 U>@ TNJ LL1 dFG 5OG A1=
. HEK D08 RA? =:O 4FD M=8 N52 OH5 F5L IDB Q50 QB> oOI `G1 U>C TNI LL2 dFD 5OD A1>
/ HEJ D09 RA> =:N 4FE M=9 N53 OH4 F5M IDC Q51 QB? oOH `G0 U>B TNH LL3 dFE 5OE A1?
: HM; D8H RIO =2? 4N4 M5H N=B O@E F=< IL2 Q=@ QJN oG9 `OA U63 TF9 LDB dN4 5G4 A9N
; HM: D8I RIN =2> 4N5 M5I N=C O@D F== IL3 Q=A QJO oG8 `O@ U62 TF8 LDC dN5 5G5 A9O
< HMI D8: RI= =2M 4NF M5: N=0 O@7 F=N IL@ Q=2 QJ< oGK `O3 U6A TFK LD0 dNF 5GF A9<
= HMH D8; RI< =2L 4NG M5; N=1 O@6 F=O ILA Q=3 QJ= oGJ `O2 U6@ TFJ LD1 dNG 5GG A9=
> HMK D88 RI? =2O 4ND M58 N=2 O@5 F=L ILB Q=0 QJ> oGI `O1 U6C TFI LD2 dND 5GD A9>
? HMJ D89 RI> =2N 4NE M59 N=3 O@4 F=M ILC Q=1 QJ? oGH `O0 U6B TFH LD3 dNE 5GE A9?
@ L49 @AJ V0M 9K= 076 ILJ JD@ K9G BD> M50 UDB U3L k>; d6C QO1 P?; H=@ `76 1>6 E@L
[ L=: @HI V9N 9B> 0>5 IEI JMC K0D BM= M<3 UMA U:O k78 d?@ QF2 P68 H4C `>5 175 EIO
\ L=I @H: V9= 9BM 0>F IE: JM0 K07 BMN M<@ UM2 U:< k7K d?3 QFA P6K H40 `>F 17F EI<
] L=H @H; V9< 9BL 0>G IE; JM1 K06 BMO M<A UM3 U:= k7J d?2 QF@ P6J H41 `>G 17G EI=
^ L=K @H8 V9? 9BO 0>D IE8 JM2 K05 BML M<B UM0 U:> k7I d?1 QFC P6I H42 `>D 17D EI>
_ L=J @H9 V9> 9BN 0>E IE9 JM3 K04 BMM M<C UM1 U:? k7H d?0 QFB P6H H43 `>E 17E EI?
` LD9 @1J V@M 9;= 0G6 I<J J4@ KIG B4> ME0 U4B UCL kN; dFC Q?1 PO; HM@ `G6 1N6 E0L
{ LM: @8I VIN 92> 0N5 I5I J=C K@D B== ML3 U=A UJO kG8 dO@ Q62 PF8 HDC `N5 1G5 E9O
| LMI @8: VI= 92M 0NF I5: J=0 K@7 B=N ML@ U=2 UJ< kGK dO3 Q6A PFK HD0 `NF 1GF E9<
} LMH @8; VI< 92L 0NG I5; J=1 K@6 B=O MLA U=3 UJ= kGJ dO2 Q6@ PFJ HD1 `NG 1GG E9=
~ LMK @88 VI? 92O 0ND I58 J=2 K@5 B=L MLB U=0 UJ> kGI dO1 Q6C PFI HD2 `ND 1GD E9>
Phil Hibbs | Capgemini
Technical Consultant
andreportugal
Participant
Posts: 5
Joined: Tue May 08, 2007 7:10 am
Location: Portugal

Post by andreportugal »

Download DataStage Decrypter for Windows:
https://sites.google.com/site/andremaur ... ects=0&d=1
(to unzip, use xpto as the password)

Image
vamsi.4a6
Participant
Posts: 334
Joined: Sun Jan 22, 2012 7:06 am
Contact:

Post by vamsi.4a6 »

How to identify Encrypted Password in dsx file?I mean where to get LD8@1HV@N this information?
chulett
Charter Member
Charter Member
Posts: 43085
Joined: Tue Nov 12, 2002 4:34 pm
Location: Denver, CO

Post by chulett »

From the logs.
-craig

"You can never have too many knives" -- Logan Nine Fingers
vamsi.4a6
Participant
Posts: 334
Joined: Sun Jan 22, 2012 7:06 am
Contact:

Post by vamsi.4a6 »

I checked in log It is showing ******.Could you please mention where exactly in the Log?
chulett
Charter Member
Charter Member
Posts: 43085
Joined: Tue Nov 12, 2002 4:34 pm
Location: Denver, CO

Post by chulett »

Check again. The first (second?) log entry shows the values of all parameters in effect when the job started and off the top of my head you should see those encrypted values there. I've got no way to check or confirm...
-craig

"You can never have too many knives" -- Logan Nine Fingers
haylo75
Premium Member
Premium Member
Posts: 15
Joined: Fri Jul 27, 2012 8:44 am

Post by haylo75 »

Many thanks to Phil for the table. I'm performing manual migration from 8.5 to 9.1, and this will come in handy for automating that process.

Why not use the Migration Tool? We're moving from DB2 on Linux to SQL Server for the Metadata repository.

Alas, I noticed the encryption scheme changed for 9.1. This may possibly be for 8.7 too, but I haven't and won't be using that version anytime soon.
The middle of every successful project looks like a disaster -- Rosabeth Moss Cantor
Post Reply