In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article introduces how to analyze the plaintext password loopholes in Web security, the content is very detailed, interested friends can refer to, hope to be helpful to you.
Plaintext is unencrypted information, plaintext password is naturally unencrypted password information, and plaintext password transmission, plaintext password storage, password weak encryption and password storage in files that attackers can access can be regarded as plaintext password loopholes.
Plaintext password transmission means that when we enter our account and password on the website and click to log in, we use Burp Suite to intercept login packets. Sometimes it is found that the login password entered is transmitted using a plaintext password without any encryption or using a weak coding method such as Base64 (which can be easily cracked, equivalent to unencrypted). If you use HTTPS to encrypt the transmission, you can solve this problem.
Plaintext password storage means that the user's password stored in the website database is usually encrypted by MD5 or other more complex encryption methods, but the plaintext is stored in the database of some websites. If the attacker attacks this kind of database, he can easily obtain the account number and password, and provide a high accurate data base for the subsequent washing and collision of the database.
Password weak encryption methods such as Base64 weak coding or Virginia password mentioned above.
Password storage is generally responsible for by the operation and maintenance personnel or server management personnel, the number of accounts and passwords they manage is very large, and these accounts and passwords are often used. Therefore, they generally keep these accounts and passwords in a text file, which is clear at a glance. If the text file is not strongly encrypted and placed in a place that can be accessed by the attacker, such as vulnerable servers, portable USB drives and private notebooks, then once the attacker enters the above-mentioned account and password storage file through technology, the user's account number and password will be disclosed. What will be the consequences of the disclosure of accounts and passwords? The secrets of enterprises and individuals will be fully exposed, which will eventually harm the interests of enterprises and individuals.
Example 1: plaintext password transmission exists in the background management office of a certain station. Enter the account number admin and password 123456 in the system login interface, and click Log in
The attacker uses Burp Suite to intercept the login request packet, as shown in the figure.
Figure intercepts login request packet
As can be seen from figure 2, the account and password are not encrypted, and there is a clear text password transmission here.
Example 2: the plaintext password is stored in the background database of a certain station. The attacker uses the SQL statement select * from forum_user to query all the records of the forum_user table in the database. You can see that the record of the password field password in the forum_ user table is not encrypted by MD5 or other strong encryption.
On how to analyze the plaintext password vulnerabilities in Web security is shared here, I hope the above content can be of some help to you, can learn more knowledge. If you think the article is good, you can share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.