this would effectively make the password hash the password. Are you sure this scheme is used?:P
On 10/16/07, Bipin Gautam <[EMAIL PROTECTED]> wrote: > > hi list, > i was reading the article, > http://www.f-secure.com/weblog/archives/00001293.html > but just an example. > > why do many people out there think password hash "can't be" as good as > the password itself and needs to be computed/cracked first before it > can be used? > > Consider the fact, many websites/forums don't use password hash+salt, > just password hash( generally SHA1, MD5) that gets computer client > side and POSTED to the web-forum for user authentication. > > If someone can sniff this, given that, user name is available using > simple GUI tools as 'Tamper Data' ( firefox plug in ) even a low tech > malicious user can log on with someones credentials without having to > crack the password hash, instead just using the password hash itself > manipulating the POST request. > > makes sense? :) > > thanks, > -bipin > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
