passwords

Migrate passwords from Drupal 7 to Django

帅比萌擦擦* 提交于 2019-12-03 17:28:41
问题 I am migrating a site from Drupal 7 to Django 1.4, including the current users. How can I work with the passwords that were hashed by Drupal? According to this, Drupal 7 hashes passwords using SHA-512 (they are stored in the form of a string starting with "$S$"). Django 1.4 now contains a number of options for storing passwords, with a default of SHA-256, but I can't find an option for SHA-512. While this app appears to allow the use of SHA2 algorithms, I'm not sure it's compatible with

Custom PHP function to verify correct password in Joomla

China☆狼群 提交于 2019-12-03 17:21:28
I created a script outside of Joomla that can successfully generate a Joomla password: // I copied the JUserHelper class from Joomla here $salt = JUserHelper::genRandomPassword(32); $crypt = JUserHelper::getCryptedPassword($password, $salt); $psw = $crypt.':'.$salt; My question is, how can I compare this new crypt:salt I generate above to a password of an existing user in the Joomla database, and know if the password supplied to the script above is the correct password for that user in the database? One way would be to query the Joomla database directly to get a user's (salted and hashed)

Java – How can I Log into a Website with HtmlUnit?

孤者浪人 提交于 2019-12-03 17:02:07
I am writing a Java program to log into the website my school uses to post grades. This is the url of the login form: https://ma-andover.myfollett.com/aspen/logon.do This is the HTML of the login form: <form name="logonForm" method="post" action="/aspen/logon.do" autocomplete="off"><div><input type="hidden" name="org.apache.struts.taglib.html.TOKEN" value="30883f4c7e25a014d0446b5251aebd9a"></div> <input type="hidden" id="userEvent" name="userEvent" value="930"> <input type="hidden" id="userParam" name="userParam" value=""> <input type="hidden" id="operationId" name="operationId" value="">

How would you add salt to your existing password hashes?

Deadly 提交于 2019-12-03 16:37:11
问题 I have a database of hashed passwords that had no salt added before they were hashed. I want to add salt to new passwords. Obviously I can't re-hash the existing ones. How would you migrate to a new hashing system? 回答1: Sure you can. Just add a salt to the existing hash and hash it again. Of course this will require any future logins to go through the same process meaning two hash functions will need to be called but lots of legitimate patterns do this anyway so it doesn't smell as bad as you

Hashing and salting a password field

流过昼夜 提交于 2019-12-03 16:14:59
I have been tossing around the question of how to store the passwords in my DB for some time now. This is my first time at making a secure application with a web login, so i wanted to set up some good practices. First, i read up on hashing and salting. It seems that the idea is... Get hashing algorithm Get password from user Add 'salt' to plain text password from user hash the entire password (including salt) Store the salt in the db so that you can retrieve it later (for verification of PSWD) And that got me thinking... If a hacker knows your salt (because it is stored in the DB somewhere,

How long should a salt be to make it infeasible to attempt dictionary attacks?

谁说我不能喝 提交于 2019-12-03 16:14:13
问题 I'm designing an authentication system that works like the following: User enters password Salt is generated. Password is hashed with whirlpool Whirlpool hashed password concatenated with the plain salt The concatenated version is hashed with sha1 and stored in the database. I check the password is correct by hashing the password on the application layer, and then doing this (in MySQL): MySQL WHERE `Password` = SHA1(CONCAT('$hashedPassword',`Salt`)) AND [..] At the moment my salt is 64 bytes.

Is it really dangerous to save hashed password in cookies?

南笙酒味 提交于 2019-12-03 15:23:57
There are many discussions about security risk for saving hash password in cookies, as upon accessing to the user's computer, a hacker can log in with the saved password. If a hacker has access to the user's computer, he can catch the password, as browsers also save passwords locally (encrypted of course). What is the difference between password set in cookies with that saved by the browser? For obvious reason, a temporary GUID should be send instead of password. In any case, I believe that limiting access to the logged IP can close doors for attackers to use locally saved GUID. Of course, it

“ORA-28001: the password has expired” not fixable

自闭症网瘾萝莉.ら 提交于 2019-12-03 15:11:37
问题 I am facing a problem with my production database. The password expired and although I changed the password, it still says it is expired. Even stranger, I have a production web application and a development web application. Both of them access the same database. The production web application works perfectly, and with the development web application I always get: 10:25:42,919 WARN [JBossManagedConnectionPool] Throwable while attempting to get a new connection: null org.jboss.resource

Checking password complexity: different from last X passwords

半世苍凉 提交于 2019-12-03 15:08:30
Most services, programs, etc. have various password complexity checks. Without delving into the efficacy of such checks , I thought of one that might be interesting, but also potentially problematic check: "The new password must be Y characters different from the last X passwords." This would prevent people from using passwords like Password1! , Password2! , and so on. But if that's done, one cannot hash the previously used password - they would be at best encrypted... Right? For a small Y and a fairly short password, you could probably still store the hash and bruteforce all Y letter

Should Password fields retain their values if a form does not pass validation?

蹲街弑〆低调 提交于 2019-12-03 14:41:21
问题 I have a typical sign-up form with two password fields. <form> <%= Html.TextBox("Email", null) %> <%= Html.Password("password", null) %> <%= Html.Password("confirmPassword", null) %> <input type='submit' /> </form> If the form fails validation and is redisplayed, the text field retains its value but the password fields are always blank. Why shouldn't the password fields retain their values? And more importantly, is there any reason I shouldn't override this behavior? I feel like this behavior