this post was submitted on 24 Jan 2024
391 points (98.5% liked)

Cybersecurity - Memes

1964 readers
2 users here now

Only the hottest memes in Cybersecurity

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] zqwzzle@lemmy.ca 52 points 9 months ago (3 children)

So they’re not hashing or salting the passwords too. Cool…

[–] Semi-Hemi-Demigod@kbin.social 17 points 9 months ago (1 children)

They might be doing it in the DB query, but they’re definitely not sanitized beforehand.

[–] CrayonRosary@lemmy.world 2 points 9 months ago (1 children)

Sanitization has nothing to do with salting and hashing.

[–] Semi-Hemi-Demigod@kbin.social 2 points 9 months ago

If you do the salting and hashing in a database query you need to sanitize the input before you use it or you open yourself to SQL injection.

Databases have salting and hashing functions, after all

[–] Rednax@lemmy.world 9 points 9 months ago (1 children)

Which makes me want to try and insert a password of a few megabytes worth of text. Should be fine, since there is no max lenght defined, right?

[–] lars@lemmy.sdf.org 4 points 9 months ago

If there is no overwrought prohibition of something I know that at least in America that means it’s

  1. Affirmatively legal and
  2. Legislatively encouraged by the FREEE Act

So give ’em hell!

[–] CrayonRosary@lemmy.world 1 points 9 months ago* (last edited 9 months ago)

That's not how it works. The code always has access to the submitted plaintext password. It's salted and hashed after it's verified for complexity. The complexity verification can even be done in JavaScript.