On Fri, Aug 12, 2011 at 5:36 PM, <[email protected]> wrote: > But yes, they need to capture the hashes somehow, in that > situation, either by sniffing or getting access to the database. > But once that compromise is done, its usually only a matter of time.
Typically if one can sniff the password hashes, one has already compromised the system to a significant extent, such that passwords are no longer needed to access resources on that system. In that case, attacking the hashes to obtain the plaintext password is usually done on the assumption that most people use the same password on multiple systems. This excepts certain historical stupidities, such as old Unix systems storing the hashed password in a world-readable file, or old NT putting the hashed password on the wire. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
