lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1080509237.4307.4.camel@localhost>
From: raymond at dyn.org (Raymond Morsman)
Subject: Nessus stores credentials in plain text

On Sat, 2004-03-27 at 17:47, ~Kevin Davis? wrote:
> Many people would disagree that storing passwords in plaintext is not a
> vulnerability.  This includes entities like ISS who were doing the same
> thing and once realized it changed it.  I don't see how a plaintext username
> and
> password is simply "system data" and not also credentials.  And guess what?
> Nessus itself has several plugins that check for plaintext passwords in
> other applications.

Q: Does Nessus use this data for its own persona-check?
A: No, it uses it for client connections.


Powered by blists - more mailing lists