Is it possible to decrypt the passwords in PPM?
AFAIK, no way,
Because it is using one-way hashing encryption algorithm, that is the ideal method anyway.
It is using a public key to encrypt which the key is public_key.txt under security directory.
It is always different.
But, you can change it as follows.
Get an encripted password with
get the encrypted text (excluding leading and trailing #!# chars),
Update the password field for a particular user in the knta_users table.
Hope it helps
As I know, PPM does not use one-way hashing for storing user password in db, The password can be decrypted.
It's MD5, one way encription. It is mean it is not convertable encription method.
PS: If the post resolves your issue, please KUDOS the professionals and mark it as Accepted Solution.
yes: you can create a script to encrypt all possible combination of characters until the encrypted string matches the one in the database.
The above statement is a bit sarcastic, but as per my knowledge, brute force is the only way to crack forward-only encryption.
I tried this:
2) entered the password I wanted
3) copy & pasted everything between #!# into the password field of the user
4) The user could not log in
We recently upgraded to 9.3. Could it be something changed between 9.2 and 9.3 and so this process does not work anymore? Previously this process was working.
Found the root cause.
Sorry, but sometimes I feel PPM is a crappy programmed bunch of bugs :DPasswords encoded with kEncrypt.sh may not contain whitespace.
So instead of
I'm pretty sure kEncrypt.sh encrypted text can be decrypted.