lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 17 Feb 2013 20:14:36 -0800
From: Jeremi Gosney <>
Subject: Re: [PHC] Asymmetry [Was: Any "large verifiers" on the panel?]

On 2/17/2013 11:46 AM, Patrick Mylund Nielsen wrote:
> One notable exception to this that I can think of is if you e.g. have
> some (possibly global) secret which is loaded from e.g. disk instead
> of the database--then attackers who are only able to leverage a SQL
> injection vulnerability would not be able to do much with the
> salt+digests from the database.

Please keep in mind that SQL injection can be leveraged to do a lot more
than just dump the database. It can also be used to read artibrary
files, and in some cases, obtain a shell running in the context of the
database or webapp.


Powered by blists - more mailing lists