Hello all!
I have just done my first tests using Access (a non-encypted ACCDE front-end) in combination with PHP calls over SSL to a SSL encrypted MySQL backend. Anyone interested in trying to crack it open and tell me how they did it?
I've already tried to copy a new autoexec macro into th ACCDE, pointing to a new form, allowing me to alter settings. But I could only inject the rogue autoexec macro, not the frmRogueForm I had planned. The app launches with a modal popup login form, and closing that without clearing password (hashed+salted with brypted) quits the application.
As for using the ACCDE: As far as I could tell, Wireshark seems to show that there is just a lot of garbled crud over the internet connection, also I did not find the PHP URLS's.
I really want to know if this is safe enough.
Look forward to hearing from you!
best regards,
Pep
I have just done my first tests using Access (a non-encypted ACCDE front-end) in combination with PHP calls over SSL to a SSL encrypted MySQL backend. Anyone interested in trying to crack it open and tell me how they did it?
I've already tried to copy a new autoexec macro into th ACCDE, pointing to a new form, allowing me to alter settings. But I could only inject the rogue autoexec macro, not the frmRogueForm I had planned. The app launches with a modal popup login form, and closing that without clearing password (hashed+salted with brypted) quits the application.
As for using the ACCDE: As far as I could tell, Wireshark seems to show that there is just a lot of garbled crud over the internet connection, also I did not find the PHP URLS's.
I really want to know if this is safe enough.
Look forward to hearing from you!
best regards,
Pep