Jump to content

SQL Server SA password

I know they encrypt it, and I believe one-way... however, ... is there anyway to break it, to recover it?  I was hoping with time over the years, there may have been something that changed.

 

I know how to reset it with the -m startup parameter, add user as admin, then reset thing (from online instructions, etc)...

 

The catch is, we don't know if there's some program that is using the sa login (the SQL server is used mainly by a third party program, as in 95% by this program, maybe 100% by it--but it's stopped backing up, not a big deal as it's a VM and the VM is backed up, BUT, we'd like to know why, problem is, the third party who installed the server can't login as sa because their sa password they have doesn't work [all variants of what they had listed as the password], and all variants we have as what it was don't work).  

 

They, nor we, don't know if there's some unknown process or software using the sa login to do something using the sa login, so we can't change the password without potentially breaking a system critical software.  And yes, we could change it, then restore from the backup--but this server just happens to have hundreds/thousands of records entered per day, and indexed, making tens-thousands of records entered daily.  It would be a cluster if we did that (so to speak)--as records are entered 7 days a week and it'd be hours of work lost.  So.. I was hoping for some way to crack the password, not just reset it, so there wouldn't be any downtime, but we could just figure out why it wasn't backing up anymore.

 

But again, it's not even a bit deal really... just a curiosity.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

I would suggest turning on logging for logins, both successful and unsuccessful and see if over a period of time sa is used. I know that doesn't directly give you an answer to your original question, but should give a good indication of which logins are being used.

 

image.png.53028b3acdbaca1e343a14937d47b179.png

Gaming - AMD TR 3970X | ASUS ROG Zenith Extreme II | G.SKILL Neo 3600 64GB | Zotac Nvidia 2080 Ti AMP | 2x Sabarent 1TB NVMe | Samsung 860 EVO 1TB SSD | Phanteks Enthoo 719 | Seasonic Prime Ultra Platinum 1000w | Corsair K70 RGB Lux | Corsiar M65 | 2x ASUS Rog PG279Q | BenQ EW3270U | Windows 10 Pro | EKWB Custom loop

ITX - Intel i7-10700k | Asus ROG Z490-I Gaming | G.SKILL TridentZ RGB 3200 32GB | EVGA 2080 Super| Samsung 970 Evo 1TB | Samsung 860 Evo 1TB SSD | NZXT H1| Windows 10 Pro

HTPC - Intel i9-9900k | Asus ROG Maximus XI Code | G.SKILL TridentZ RGB 3200 32GB | EVGA 1070 | Samsung 970 1TB | WD Blue 1TB SSD | NZXT H700  | EVGA G3 1000W | Corsair H150i | Windows 10 Pro

Servers - SuperMicro 846 | 2x 2695L V2 | 128GB | Chelsio 10Gbe | Chelsio 40Gbe | 24 x 6TB | FreeNas - SuperMicro 826 | 2 x 2695L | 128GB | Chelsio 10Gbe | Chelsio 40Gbe | 8 x 10TB | 847 24 x 1TB SSD | Windows Server 2019

Work - Dell XPS 15 9560 | i7-7700HQ | 32 GB RAM | 1TB NVMe | 4k dsiplay

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×