[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5121AAAC.3090700@bindshell.nl>
Date: Sun, 17 Feb 2013 20:14:36 -0800
From: Jeremi Gosney <epixoip@...dshell.nl>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Asymmetry [Was: Any "large verifiers" on the panel?]
On 2/17/2013 11:46 AM, Patrick Mylund Nielsen wrote:
> One notable exception to this that I can think of is if you e.g. have
> some (possibly global) secret which is loaded from e.g. disk instead
> of the database--then attackers who are only able to leverage a SQL
> injection vulnerability would not be able to do much with the
> salt+digests from the database.
Please keep in mind that SQL injection can be leveraged to do a lot more
than just dump the database. It can also be used to read artibrary
files, and in some cases, obtain a shell running in the context of the
database or webapp.
Cheers,
Jeremi
Powered by blists - more mailing lists