Yay for social engineering.
That and with some physical access all bets are pretty much off
Passwords shouldn't be stored with 2 way encryption. Machine or otherwise, there shouldn't be a way to say decode hashed password and get the plain text equivalent. It's little more secure than saving it in the database in plain text. Chances are if you've got that level of access, you can probably decompile the program and find out how to get from a to b to use said password elsewhere
The only way to know if the user entered the right password is to hash the entered password, and see if it matches the stored hash.
Getting your password back in plain text means they are not saving it securely.
Obviously, it should be salted, yada yada..
Emailing it in plain text is obviously also asking for trouble.
Or find an employee to hand them it on a plate http://www.guardian.co.uk/commentisfree/2013/jan/17/sacked-model-modern-employee-outsourcing
Easy is subjective. That's got a real world obviously built into it, it's also got repeating patterns.
Brute forcing it would generally take a while purely with it being longer and not completely alphanumeric, going A-Z, 0-9, everything else...
That and with some physical access all bets are pretty much off
How does requesting your password tell you if it's stored securely or not?
The password can/will still be hashed. The script knows it's only sending the password to the registered email address; so it will automatically look up your record, decrypt it, and send it. It's not a human on the other side that gets your password and types it up in an email to you.
Though this type of plain text password emailing is a problem if your email account is compromised, just as much as other methods of password resetting.
Passwords shouldn't be stored with 2 way encryption. Machine or otherwise, there shouldn't be a way to say decode hashed password and get the plain text equivalent. It's little more secure than saving it in the database in plain text. Chances are if you've got that level of access, you can probably decompile the program and find out how to get from a to b to use said password elsewhere
The only way to know if the user entered the right password is to hash the entered password, and see if it matches the stored hash.
Getting your password back in plain text means they are not saving it securely.
Obviously, it should be salted, yada yada..
Emailing it in plain text is obviously also asking for trouble.
It goes some way to stopping people breaking in remotely from china, but all you have to do is walk in dressed as a cleaner just after work hours and read them. Good pen testing firms will do this![]()
Or find an employee to hand them it on a plate http://www.guardian.co.uk/commentisfree/2013/jan/17/sacked-model-modern-employee-outsourcing
Would a password like this be secure then?
DOnk3yf4c3#!#!5432
Or would it be easy to hack?
Easy is subjective. That's got a real world obviously built into it, it's also got repeating patterns.
Brute forcing it would generally take a while purely with it being longer and not completely alphanumeric, going A-Z, 0-9, everything else...
Last edited: