welcome to XRM blog

Keep in touch with latest CRM/ERP articles

To remain competitive your organisation must be efficient across the business process spectrum. To do so you need to take sound decisions based on a balance between the cost and risk. To do so you will be heavily dependent on your content management in itself needs...

image
Blog

Modifying Encrypted Passwords using SQLite for Web Application Authentication

By Divya Mishra on 8/14/2025

Introduction 

In web applications where user authentication is managed through an SQLite database, there may arise situations where developers or testers need to update or verify user credentials directly from the database. This blog demonstrates a step-by-step approach to modifying the Users.db SQLite file for password updates using DB Browser (SQLite), while providing insights into how different application files handle user authentication, encryption, and JWT generation. 

This use case is particularly relevant in development or troubleshooting scenarios where understanding the flow of authentication and encrypted password verification is essential. 

Background About the Web application: 

The Users.db file is managed through four key components in the application: UserController.cs, CipheContext.cs, EncryptionManager.cs, and AuthServiceManager.cs. 

These files collectively handle interactions, operations, and authentication related to the Users.db database file. 

  • UserController.cs: The Authenticate method receives a request containing user credentials which you have given from Postman. It passes these credentials to an authentication service (_authService) to verify them. If the response from the service is null (indicating invalid credentials), it returns a Bad Request response with an error message stating "Username or password is incorrect”. If the credentials are valid, it responds with a success status OK along with the authentication details. 

The PostUserMaster function in this UserController encrypts the user's password received in the request, adds the user's data to the database, and then returns a response confirming the creation of the user. 

  • AuthServiceManager.cs: The Authenticate method in the AuthServiceManager class is responsible for verifying user credentials and managing the authentication process. It first checks the database for a user with the provided username and verifies if the user is active. If a matching user is found and their password matches the input using BCrypt's verification method, it generates a JWT token via the generateJwtToken function. This token is then used to create an AuthenticateResponse object, which is returned to signify successful authentication. If the user is not found or the password doesn't match, it returns null, indicating authentication failure. 

Both generateJwtToken and generateJwtToken1 methods create JWT (JSON Web Token) strings for authentication purposes. They use the JwtSecurityTokenHandler class to generate tokens that are valid for one day (Expires = DateTime.UtcNow.AddDays(1)). 

These methods build a token descriptor containing user information or user ID as a claim. They also set the token's expiration, issuance time, and define the signing credentials using a symmetric key obtained from the _appSettings.Secret. Finally, the token is created and serialized into a string using tokenHandler.WriteToken(token), which is then returned for use in the authentication process. 

  • CipheContext.cs: The path specified in the optionsBuilder.UseSqlite method within the CipheContext class points to the location of the SQLite database file named Users.db. It's set to a specific directory on the local machine, such as "C:\\Users\\MI\\Downloads\\repository - Dev (4)\\repository - Dev\\Users.db". This path is crucial as it determines where the application will look for and interact with the SQLite database file for storing and retrieving data.  

The OnConfiguring method in the DbContext class is essential for defining which database provider to use and setting up the appropriate connection string. Here, it's used to define the SQLite database file's location, while OnModelCreating is employed to configure the primary key for the userMaster entity, ensuring proper database structure and key constraints. 

  • EncryptionManager.cs: The EncryptionManager class is a static utility that offers encryption and decryption functionalities using TripleDES encryption. It obtains an encryption secret from application settings to perform secure encryption and decryption operations on provided strings, enhancing data security within the CipheConnectApp. 

The web application validates both the name and plain text password provided in Postman, alongside the username and hashed password stored in the Users.db file. If the web application successfully verifies this information, it means the plain text password entered in Postman matches the hash present in the Users.db file under the password column. Then, it will return the token in the Postman. In case of a mismatch, an error is returned in Postman indicating that the username and password are incorrect. The password stored in the Users.db file is in encrypted or hashed form, derived from the plain text password inputted in Postman. 

Password Update Procedure in Users.db: 

Screenshots of postman request containing old password: 

A screenshot of a computer

AI-generated content may be incorrect. 

A screenshot of a computer

Description automatically generated 

  1. First, install the DB browser (SQLite) on your system to open the Users.db file. 

 

  1. Once the installation is successful, click the "Open Database" option to access the Users.db file. 

A screenshot of a computer

Description automatically generated 

  1. Choose the Users.db file you wish to open, then click "OK" to open it. Once opened, it will display all the tables and columns it contains. 

 

  1. Now, right-click on the "UserMaster" table to view its data. Select "Browse Table," and it will show you all the table data. 

A screenshot of a computer

AI-generated content may be incorrect. 

Note that the password stored in the database is in an encrypted (hashed) format. 

  1. To generate a hash of your plain text password, you can use a web application or your web browser. 

To generate the hash of plain text using your web browser. In web browser, Paste this link: https://bcrypt.online/ . Using this website, you can generate the hash code of any new plain text, or you can verify any hash code with its plain text. 

A screenshot of a computer

Description automatically generated 

A screenshot of a computer

Description automatically generated 

Here's an example of how to do it with a web application: 

To get the hash of your plain text. Add the below line in your web application. Through debugging one by one line of code, you can get the hash of this plain text. Copy the hash password. 

var hashPassword = BCrypt.Net.BCrypt.HashPassword("Your plain text password");  

  1. After generating the hash, update the plain text password in the Postman request body and paste the hash of that plain text password that you copied into the Users.db file. Your new password will now work. 

Screenshots of postman request containing new password: 

A screenshot of a computer

Description automatically generated 

A screenshot of a computer

Description automatically generated 

Conclusion 

Directly updating hashed passwords in an SQLite database can be useful for development, testing, or recovery scenarios. However, it's essential to follow encryption practices and ensure consistency between application logic and database values. Understanding the roles of controllers, authentication services, and encryption managers strengthens your ability to debug and manage web authentication systems securely and effectively. 

#BCrypt
#DBBrowserforSQLite
#PasswordHashing
#SQLite
#WebApplicationSecurity
Blog Calendar
Blog Calendar List
2025 Aug  12  4
2025 Jul  15  9
2025 Jun  21  6
2025 May  51  9
2025 Apr  35  6
2025 Mar  54  7
2025 Feb  41  6
2024 Nov  11  1
2024 Aug  8  1
2024 Apr  59  4
2024 Mar  165  4
2024 Feb  485  3
2024 Jan  33  7
2023 Dec  42  6
2023 Nov  628  5
2023 Oct  850  12
2023 Sep  1965  9
2023 Aug  602  6
2023 Jul  47  6
2023 Jun  26  4
2023 May  44  5
2023 Apr  88  5
2023 Mar  228  6
2023 Feb  177  5
2023 Jan  86  4
2022 Dec  96  7
2022 Nov  297  2
2022 Sep  13  1
2022 Aug  32  2
2022 Jun  11  2
2022 May  6  2
2022 Apr  12  2
2022 Mar  2  1
2022 Feb  2  1
2022 Jan  1  1
2021 Dec  4  1
2021 Nov  2  1
2021 Oct  2  1
2021 Sep  14  1
2021 Aug  49  5
2021 Jul  52  4
2021 Jun  1902  5
2021 May  43  3
2021 Apr  2266  3
2021 Mar  217  5
2021 Feb  2807  7
2021 Jan  4248  9
2020 Dec  598  7
2020 Sep  83  3
2020 Aug  792  3
2020 Jul  139  1
2020 Jun  101  3
2020 Apr  104  3
2020 Mar  19  2
2020 Feb  34  5
2020 Jan  48  7
2019 Dec  18  4
2019 Nov  41  1
2019 Jan  23  2
2018 Dec  146  4
2018 Nov  68  3
2018 Oct  18  3
2018 Sep  1286  11
2018 Aug  7  2
2018 Jun  21  1
2018 Jan  74  2
2017 Sep  590  5
2017 Aug  17  1
2017 Jul  17  2
2017 Jun  65  2
2017 May  21  1
2017 Apr  40  2
2017 Mar  144  4
2017 Feb  860  4
2016 Dec  210  3
2016 Nov  1093  8
2016 Oct  350  10
2016 Sep  821  6
2016 Aug  40  1
2016 Jun  1895  6
2016 May  116  3
2016 Jan  73  2
2015 Dec  764  6
2015 Nov  4  1
2015 Oct  13  1
2015 Sep  1472  6
2015 Aug  14  1
2015 Jul  129  2
2015 Jun  11  1
2015 May  20  1
2015 Apr  30  3
2015 Mar  80  3
2015 Jan  5350  4
2014 Dec  18  1
2014 Nov  2260  4
2014 Oct  69  1
2014 Sep  107  2
2014 Aug  5344  1
2014 Jul  49  2
2014 Apr  2602  12
2014 Mar  308  17
2014 Feb  223  6
2014 Jan  1510  16
2013 Dec  21  2
2013 Nov  695  2
2013 Oct  256  3
2013 Sep  13  1
2013 Aug  40  3
2013 Jul  214  1
2013 Apr  62  6
2013 Mar  2403  10
2013 Feb  131  3
2013 Jan  353  2
2012 Nov  63  2
2012 Oct  519  10
Tag Cloud
Interested in our services? Still not sure about project details? get a quote