-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi 3APAPA,
On Tue, 16 Oct 2007 15:30:56 -0400 Bipin Gautam <[EMAIL PROTECTED]> wrote: >hi list, >i was reading the article, http://www.f- >secure.com/weblog/archives/00001293.html >but just an example. blah blah blah, this is full-disclosure not some dear diary/myspace bullshit, >why do many people out there think password hash "can't be" as >good as >the password itself and needs to be computed/cracked first before >it >can be used? dunno why don't you tell me? >Consider the fact, many websites/forums don't use password >hash+salt, >just password hash( generally SHA1, MD5) that gets computer client >side and POSTED to the web-forum for user authentication. done >If someone can sniff this, given that, user name is available >using >simple GUI tools as 'Tamper Data' ( firefox plug in ) even a low >tech >malicious user can log on with someones credentials without having >to >crack the password hash, instead just using the password hash >itself >manipulating the POST request. > >makes sense? :) no please clarify!!! >thanks, >-bipin > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.grok.org.uk/full-disclosure-charter.html >Hosted and sponsored by Secunia - http://secunia.com/ -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Charset: UTF8 Version: Hush 2.5 wpwEAQECAAYFAkcVFTIACgkQ+dWaEhErNvT69AP/f2E9mQoWjU+Tf9/zSAT4LKV6k4jR sozte7HJXySMyvPnku1th5BW5nGBj8uJuvetrmvGAYKjsjhsOpwDSCuwZXbY/kzXJSg2 WZcMOvn/3HCgMxx44MvsgtfjAJAvUa7QoArC7LabPsAVOZrHOy9Ipn/EjOZW7LvRXoVH Nmr86ZE= =IuAp -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
