Number 3 on OWASP top 10 for 2017
Sensitive data is exposed to the public
Number 3 on OWASP top 10 for 2017
Sensitive data is exposed to the public
Number 3 on OWASP top 10 for 2017
Sensitive data is exposed to the public
Number 3 on OWASP top 10 for 2017
Sensitive data is exposed to the public
Hashing is enabled via a hash function. A hash function h
has these properties:
h(s)
might look something like b8d08e682534b7a847f174e41f584827
Hashing is enabled via a hash function. A hash function h
has these properties:
Convert strings into a "hash" of characters: h(s)
might look something like b8d08e682534b7a847f174e41f584827
Similar strings have very different hashes
Hashing is enabled via a hash function. A hash function h
has these properties:
Convert strings into a "hash" of characters: h(s)
might look something like b8d08e682534b7a847f174e41f584827
Similar strings have very different hashes
If str1
and str2
are different, then it is very, very rare for h(str1) == h(str2)
(if this does happen, we say a "collision" has occured)
Hashing is enabled via a hash function. A hash function h
has these properties:
Convert strings into a "hash" of characters: h(s)
might look something like b8d08e682534b7a847f174e41f584827
Similar strings have very different hashes
If str1
and str2
are different, then it is very, very rare for h(str1) == h(str2)
(if this does happen, we say a "collision" has occured)
It is not feasible to "undo" h
(i.e. we can't find a function g
so that g(h(str)) == str
always)
Hashing is enabled via a hash function. A hash function h
has these properties:
Convert strings into a "hash" of characters: h(s)
might look something like b8d08e682534b7a847f174e41f584827
Similar strings have very different hashes
If str1
and str2
are different, then it is very, very rare for h(str1) == h(str2)
(if this does happen, we say a "collision" has occured)
It is not feasible to "undo" h
(i.e. we can't find a function g
so that g(h(str)) == str
always)
h
is fast
Hashing passwords by itself is vulnerable to Rainbow Table attacks
Hashing passwords by itself is vulnerable to Rainbow Table attacks
Hashing passwords by itself is vulnerable to Rainbow Table attacks
Salting makes Rainbow Tables useless (not all salt processes work exactly like this)
Salting makes Rainbow Tables useless (not all salt processes work exactly like this)
h(password + salt)
is stored in the databaseSome hashing algorithms (such as Bcrypt) have salting built in to them, so a programmer does not need to manually generate and keep track of salts.
In such cases, the salt will be part of the generated hash string, and does not need to be separately stored in the database.
Keyboard shortcuts
↑, ←, Pg Up, k | Go to previous slide |
↓, →, Pg Dn, Space, j | Go to next slide |
Home | Go to first slide |
End | Go to last slide |
b / m / f | Toggle blackout / mirrored / fullscreen mode |
c | Clone slideshow |
p | Toggle presenter mode |
t | Restart the presentation timer |
?, h | Toggle this help |
Esc | Back to slideshow |