Microsoft Access

Password cracking

John

See John the Ripper (JtR).

Extract the hash:

/usr/share/john/office2john.py <filename>.accdb > ~/accdb-hash.txt
Database1:$office$*2013*100000*256*16*226ca05f81559cb4af164141397c925b*7dd0f8867574a2c0ac36a51b660c7e5b*585f0da85a0d445f0d1e285a6789ca92b5128fa77cb3e5e516f5ac5ea27114d5

Crack the hash:

john --mask='myp?l?l?l' ~/accdb-hash.txt

Hashcat

See Hashcat.

Download office2hashcat.py to extract hash from the the Microsoft Access file.

python office2hashcat.py <filename>.accdb > ~/accdb-hash.txt
$office$*2013*100000*256*16*226ca05f81559cb4af164141397c925b*7dd0f8867574a2c0ac36a51b660c7e5b*585f0da85a0d445f0d1e285a6789ca92b5128fa77cb3e5e516f5ac5ea27114d5
HASH=accdb-hash.txt
TYPE=9600 # change type depending on Office version
WL=/usr/share/wordlists/rockyou.txt
hashcat -m $TYPE -a 0 $HASH $WL