What if an attacker know that I am using this library?
See original GitHub issueAs we know, the hash
method is returning a JSON string which contains: hash, salt, keyLength, hashMethod, iterations. Now, without knowing how an app using this library is hashing passwords, the attacker will have no way/will be slowed down when trying(?) to crack the passwords, but what if he/she knows that I am using credential
library (and also its version)?
If you don’t mind another question, how would you go about rehashing users passwords with more cycles? https://github.com/ericelliott/credential/issues/23#issuecomment-83959967
Issue Analytics
- State:
- Created 8 years ago
- Comments:9 (1 by maintainers)
Top Results From Across the Web
Ransomware Attacks at Libraries: How They Happen, What to ...
It is important for libraries to take preemptive measures because once you get hit with a ransomware attack it's too late. Review with...
Read more >Secure loading of libraries to prevent DLL preloading attacks
The attacker knows this information about the application and controls the CWD. The attacker copies their own specially crafted version of the DLL...
Read more >Libraries, Beware: Ransomware | Library Developments
Usually this means that your files become encrypted and only the attackers know the key. When a targeted organization's servers are infected ...
Read more >Keep Yourself Safe When Using Public Computers - ITRC
Read how to protect yourself online when you use public computers at your local library, school, cyber café, or hotel lobby.
Read more >How Companies Are Hacked via Malicious Javascript Code?
Attackers can use the same way to hack the target computers using vulnerabilities on a JavaScript Libraries. When malicious code is executed, you...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Closing all stale issues and PRs. Please update, ensure all tests pass, and reopen if you really want this in.
What you’re referring to is a “pepper”, and yes, it may give you some additional security in the specific scenario where your database is compromised but your application is not. If you want to do this, it is as simple as appending your pepper before handing it to the
hash
method.There are more in-depth answers here: http://security.stackexchange.com/questions/3272/password-hashing-add-salt-pepper-or-is-salt-enough