When you create or update an NSM user account password, the newly stored password is salted with a random 256-bit salt value. Also, it is hashed using
PBKDF2WithHmacSHA1 as the
PseudoRandom Function (PRF).
This process mitigates exposing raw hash values to hackers and makes it more secure. So, you can't recover the NSM password and must reset it with these steps:
- Open a command prompt on the NSM.
- Change directory:
- For NSM 8.x, 9.1 earlier than 9.1.7.77 and 9.2:
Change to $:\mysql\bin (the default is C:\mysql\bin\).
- For NSM 9.1.7.77 and later and 10.x:
Change directory to $:\MariaDB\bin (for example, c:\MariaDB\bin).
NOTE: For upgrades, the default location is the previous database installation directory.
- Log on to the database:
Type Mysql -u root -p and then press Enter. You are prompted for the root password you specified during installation.
- Change to the correct database:
Type Use lf; and press Enter. This command changes to the correct database.
- Discover the hash (authtype) for UUID1:
Type SELECT authtype FROM iv_usercredential WHERE UUID = 1; and press Enter.
- View the output. You see MD5, SHA-1, or PBKDF2 listed for the hash used. Note the output and continue.
- Reset the password:
Change the hash of UUID1 to the hash you discovered above. Type the appropriate command for your platform and set the password to admin123:
- If authtype is MD5, run the following command:
UPDATE iv_usercredential SET crval='3304b042e5d8426e5f503e58723cd931' WHERE UUID=1;
- If authtype is SHA-1, run the following command:
UPDATE iv_usercredential SET crval='f865b53623b121fd34ee5426c792e5c33af8c227' WHERE UUID=1;
- If authtype is PBKDF2, run the following command:
UPDATE iv_usercredential SET crval='1000:5b42403330353662666239:7de27beab86bdba6807eafa380fcce3f2b6769044d7669befbe101e6fa40fe24dbde7e6e388fae231defdecb8e997e382c1c8a6da2623e473e68cac2908eab42' WHERE UUID=1;
- If authtype is PBKDF2WithHmacSHA512, run the following command:
UPDATE iv_usercredential SET crval='10000:5b2d33312c2032302c2034372c2037362c2035372c203131352c2039372c2039382c2036302c202d36302c202d33362c202d32332c2037302c202d3132362c2035352c2031335d:9fd13e55c3fb7f086c3744b092085ae26a024f5e8670d275276c820012c1cc9e17cd70a3f657e64d0696564fbf70c5ef8d2e69370cc8806d0daf01b7f6a20afc' WHERE UUID=1;
- Log on to the NSM with the password admin123.
NOTE: McAfee recommends that you change your password immediately.