On Fri, Aug 12, 2011 at 5:36 PM, <[email protected]> wrote:
> But yes, they need to capture the hashes somehow, in that
> situation, either by sniffing or getting access to the database.
> But once that compromise is done, its usually only a matter of time.

  Typically if one can sniff the password hashes, one has already
compromised the system to a significant extent, such that passwords
are no longer needed to access resources on that system.  In that
case, attacking the hashes to obtain the plaintext password is usually
done on the assumption that most people use the same password on
multiple systems.

  This excepts certain historical stupidities, such as old Unix
systems storing the hashed password in a world-readable file, or old
NT putting the hashed password on the wire.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to