473,837 Members | 1,783 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Re: Decrypting String / DB

2 New Member
Hi Guys,

First Post. Need some help decrypting a String / DB

The company i manage recently had an argument with their lead programmer for their data base. However he has decided to have nothing to do with the company so i cannot contact him to get the info i require.

Ive looked over his computer and accessed the .dat (I have no idea why its a .dat file) file using the password however when i open it up in Access i can view the data with all the tables and fields present however it appears part of the data which actually contains the data is all gobble de gook which i am guessing is because its encrypted.

I had a quick look through his computer and Notes to look for any instructions to decrypt the info however it doesn't mention anything.

However i have found 3 items in his notes which i am sure are Keys to the encryption 2 of which are the same and either 3 could be for the other 2 database files which i need to decrypt. (The encryption property on the file is not set. So i guess the information is encrypted and then stored)


this is what the data currently looks like in table view

Expand|Select|Wrap|Line Numbers
  1. ,,,,,,,,wjtcehwwyjwiF,,qwwjqE yfgjI,wergC efzgcstH .qE,|88733|H|3|F3|yhfzqgsE||FF3 73IF|wjtcehwwyjwiF|hwwyjwiF||qwwjqE yfgjI}!|wergC efzgcstH .qE|{
  2.  
Its supposed to be a clients address with maybe mapping info for plotting on google Maps and other info im unsure of. Ive never worked on this project and don't know much about the foundations of the db however looking at what i got in Access i have many tables with info that needs decrypting that is more sensitive and others which are normal such as dates or client names.

Could anybody please explain to me how i can apply the keys and decrypt the info?

Is there a particular function within access i can call to decrypt my string and get the info?

Ps there are certain functions which he deleted and this maybe one of them and no backups are available.


Appreciate any Help!
Dec 9 '07 #1
5 3451
missinglinq
3,532 Recognized Expert Specialist
I'm confused here; a .DAT file is a data file used by a number of different development languages/applications to store raw data, but it certainly isn't used for any version of Access! Access databases are all inclusive, which is to say everything, data, user interfaces, etc. is all included in one file. If you've somehow managed to open a .DAT file in Access (and I can't imagine how, unless you've changed the file extension) data could certainly exhibit the behavior you've reported.

If, however, this really is a case encrypted data, I'm afraid that giving help on this type of problem is against the policies of this site. After all, we really have no way to know that you actually have a right to this information, and to help when we don't know this would be unethical and possibly illegal. My suggestion would be to contact someone in your area who either develops Access applications or specializes in data recovery. Note that consultants, if legitimate, will require proof that you do, indeed, have a legal right to this application/data.

Linq ;0)>
Dec 9 '07 #2
Harb247
2 New Member
Its ok i understand what you are saying. Like i said i didnt develop the database ive just been asked by my comapany to figure out whats going on. And as i said i already have the password and the encryption keys i just wasnt sure how to apply them.

Any way ill get onto some data recovery guys in the morning to see if they can help figure it out.

Thanks for your help anyway.
Dec 9 '07 #3
missinglinq
3,532 Recognized Expert Specialist
Good luck!

Linq ;0)>
Dec 9 '07 #4
RoyalMailLegalTeam
2 New Member
Harb247

It's clear that you are trying to decode the copyrighted and licensed Royal Mail Postal Address File (PAF). This is illegal.

To license a copy of the data, you can visit our website:
http://www.royalmail.c om/portal/rm/jump2?catId=400 120&mediaId=400 084

You will not be able to decrypt this information without the vendor's private key - I have been able to identify the data owner from the data string you pasted in your last post and reported a data breach to them.

Please note that Royal Mail employ a team of people to protect its data rights and we will pursue anyone who is fraudulently trying to obtain our copyrighted information without a licence.

Regards

Malcolm Johnson
Royal Mail
Jan 29 '08 #5
RoyalMailLegalTeam
2 New Member
Hi Guys,

First Post. Need some help decrypting a String / DB

The company i manage recently had an argument with their lead programmer for their data base. However he has decided to have nothing to do with the company so i cannot contact him to get the info i require.

Ive looked over his computer and accessed the .dat (I have no idea why its a .dat file) file using the password however when i open it up in Access i can view the data with all the tables and fields present however it appears part of the data which actually contains the data is all gobble de gook which i am guessing is because its encrypted.

I had a quick look through his computer and Notes to look for any instructions to decrypt the info however it doesn't mention anything.

However i have found 3 items in his notes which i am sure are Keys to the encryption 2 of which are the same and either 3 could be for the other 2 database files which i need to decrypt. (The encryption property on the file is not set. So i guess the information is encrypted and then stored)


this is what the data currently looks like in table view

Expand|Select|Wrap|Line Numbers
  1. ,,,,,,,,wjtcehwwyjwiF,,qwwjqE yfgjI,wergC efzgcstH .qE,|88733|H|3|F3|yhfzqgsE||FF3 73IF|wjtcehwwyjwiF|hwwyjwiF||qwwjqE yfgjI}!|wergC efzgcstH .qE|{
  2.  
Its supposed to be a clients address with maybe mapping info for plotting on google Maps and other info im unsure of. Ive never worked on this project and don't know much about the foundations of the db however looking at what i got in Access i have many tables with info that needs decrypting that is more sensitive and others which are normal such as dates or client names.

Could anybody please explain to me how i can apply the keys and decrypt the info?

Is there a particular function within access i can call to decrypt my string and get the info?

Ps there are certain functions which he deleted and this maybe one of them and no backups are available.


Appreciate any Help!
Harb247

It's clear that you are trying to decode the copyrighted and licensed Royal Mail Postal Address File (PAF). This is illegal.

To license a copy of the data, you can visit our website:
http://www.royalmail.c om/portal/rm/jump2?catId=400 120&mediaId=400 084

You will not be able to decrypt this information without the vendor's private key - I have been able to identify the data owner from the data string you pasted in your last post and reported a data breach to them.

Please note that Royal Mail employ a team of people to protect its data rights and we will pursue anyone who is fraudulently trying to obtain our copyrighted information without a licence.

Regards

Malcolm Johnson
Royal Mail
Jan 29 '08 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

0
8250
by: chris | last post by:
I'm writing a small app to help me learn more about cryptography. All it does is encrypt all of the files in directory A, and put the encrypted versions of the files in directory B. It then decrypts the files in directory B, and puts them in directory C. I'm getting some exceptions when I try to decrypt a binary file though. Here's the code: ////////////////////////////////////////////////////////////////////// public class...
3
4614
by: JW | last post by:
I can encrypt the contents of a memory stream with no problems, however when decrypting( I'm using the same key an IV ) I get an exception stating bad data. I'm at a lost. I'm actually creating a new memory stream, filling it with the encrypted bytes then trying to read from the crypto stream object. I have used the same approach encrypting to a file handle and then decrypting from the same file and it works.
3
14023
by: James | last post by:
Hi, I am developing a ActiveX Control which will be used in a web page. The control will encrypt some value then decrypt it when the web page opens next time. I tested the control in a windows application and it works fine and no error jumps. However, when I tried to use it in a web page, problems came. There is no problem for encrypting but the decrypting can't be finished. The error jumped from the line below
5
8999
by: Joe | last post by:
I'm trying to figure out how to remove the characters padded to the end of my string without setting the Padding = PaddingMode.None. My original string passed in is 'passwordTest' and the resulting decrypted string is 'passwordTestAAAAAAAAAA==' I would like to use for both strings and files. private static string DoEncryption(byte data) {
8
5238
by: KRoy | last post by:
I have a password stored in the Registry encrypted using System.Security.Cryptography DES Algorithm. I supplied it a password and a Initialization Vector. I am trying to decrypt it using the CryptoAPI in VB6. I am using the CryptDeriveKey to generate a session key from a password. But it is not working and I am sure the password is correct. In .net I supplied an IV, when and how do I do that using
11
1637
by: mpmason14 | last post by:
i have a form that i will be using when the user opens a report that asks the user if they want to decrypt social security numbers stored in the database or not. the module to do the encrypting/decrypting works perfectly, but when i try and apply it to the form on a command button (labeled "yes"), it gives me a VB runtime error - "Run-time error '424': Object required". i have the code below - i am using MS Access 2003. as always, i...
4
5706
by: Fritjolf | last post by:
Hi. I've got a strange problem... I've made a simple program to test encryption/decryption. I use Rijndael encryption and here are the most important properties. RijndaelManaged cipher = new RijndaelManaged(); cipher.KeySize = 256; cipher.BlockSize = 256;
1
6436
by: Elliot | last post by:
When decrypt the xml, output "Unable to retrieve the decryption key." Can anyone help me solve the problem? I got the code from http://msdn.microsoft.com/en-us/library/ms229746.aspx using System; using System.Xml; using System.Security.Cryptography; using System.Security.Cryptography.Xml;
2
4705
by: prasath03 | last post by:
Hi, I wrote a java program for Encrypt and Decrypt the given string, when i execute the program it show me an error....but the string has Encrypted, if i want to Decrypt the string it show me an error... The error is: javax.crypto.IllegalBlockSizeException: Input length must be multiple of 8 when decrypting with padded cipher Encoded: --> pLqxYQViK5U Decoded: --> null
0
9853
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10903
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10584
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10644
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10289
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7827
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5681
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5864
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
3
3131
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.