question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

What if an attacker know that I am using this library?

See original GitHub issue

As we know, the hash method is returning a JSON string which contains: hash, salt, keyLength, hashMethod, iterations. Now, without knowing how an app using this library is hashing passwords, the attacker will have no way/will be slowed down when trying(?) to crack the passwords, but what if he/she knows that I am using credential library (and also its version)?

If you don’t mind another question, how would you go about rehashing users passwords with more cycles? https://github.com/ericelliott/credential/issues/23#issuecomment-83959967

Issue Analytics

  • State:closed
  • Created 8 years ago
  • Comments:9 (1 by maintainers)

github_iconTop GitHub Comments

1reaction
ericelliottcommented, Jun 20, 2018

Closing all stale issues and PRs. Please update, ensure all tests pass, and reopen if you really want this in.

0reactions
tjconceptcommented, Dec 13, 2015

What you’re referring to is a “pepper”, and yes, it may give you some additional security in the specific scenario where your database is compromised but your application is not. If you want to do this, it is as simple as appending your pepper before handing it to the hash method.

There are more in-depth answers here: http://security.stackexchange.com/questions/3272/password-hashing-add-salt-pepper-or-is-salt-enough

Read more comments on GitHub >

github_iconTop Results From Across the Web

Ransomware Attacks at Libraries: How They Happen, What to ...
It is important for libraries to take preemptive measures because once you get hit with a ransomware attack it's too late. Review with...
Read more >
Secure loading of libraries to prevent DLL preloading attacks
The attacker knows this information about the application and controls the CWD. The attacker copies their own specially crafted version of the DLL...
Read more >
Libraries, Beware: Ransomware | Library Developments
Usually this means that your files become encrypted and only the attackers know the key. When a targeted organization's servers are infected ...
Read more >
Keep Yourself Safe When Using Public Computers - ITRC
Read how to protect yourself online when you use public computers at your local library, school, cyber café, or hotel lobby.
Read more >
How Companies Are Hacked via Malicious Javascript Code?
Attackers can use the same way to hack the target computers using vulnerabilities on a JavaScript Libraries. When malicious code is executed, you...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found