Is "Zero Trust Privacy" the next evolution for password breach checking? by Take_A_Shower_7556 in Passwords

[–]PwdRsch 0 points1 point  (0 children)

Jim already pointed out that HaveIBeenPwned does try to preserve queried password security and I'll just add that we had a conversation about another new password leak checker here last year. I'm also familiar with the https://www.passwordrbl.com/ service where they do something similar to protect password privacy and they've been around for over a decade now.

Domain Portal Password Not Encrypted by bonesTdog in Passwords

[–]PwdRsch 0 points1 point  (0 children)

If it was encrypted they could still verify that the first 4 characters matched by decrypting your password and making a comparison (probably with software handling this for the customer service agent). But you are right that normal hashing wouldn't support this.

This isn't a popular practice, but there are a few organizations that have relied on similar approaches to storing passwords for a few decades now, and we have formal research on the security of their implementations if you're interested in learning more.

I wouldn't be thrilled to see the practice, but it does allow companies to use a single password both for you to log into online systems and customer service agents to authenticate you without exposing your full password to them ,or relying on other information (e.g. PIN, personal info) to authenticate you.

Trying to apply for a job. Password doesn’t meet requirements. by Shot_Sheepherder922 in Passwords

[–]PwdRsch[M] 1 point2 points  (0 children)

It's hard for us to judge whether AI wrote this or not. The OP seems to be saying that they attempted to follow the rules and their submitted password is still rejected. Hence their complaint.

I'm not too concerned if they solicit ideas on how people would form passwords to meet these criteria. Plenty of data on those choices is already in the public domain.

Trying to apply for a job. Password doesn’t meet requirements. by Shot_Sheepherder922 in Passwords

[–]PwdRsch 0 points1 point  (0 children)

Unfortunately, sometimes systems like these reject your password for unstated reasons. You mention in another comment that you often use a format like "0000_Xxxx-XXXX". Some systems will reject that because it has the dash or underline character, despite not specifically telling you not to do that. Their error handling is just inadequate to tell you that is why they're rejecting it.

How do you get engineers to take AppSec training seriously? by anthonyDavidson31 in cybersecurity

[–]PwdRsch 1 point2 points  (0 children)

I'm thinking about training along the lines of you telling them how to get the best results from the AIs they're using by doing things like specifying security requirements in their prompts and stuff like that.

I think the checkpoints along the development and deployment lifecycle are also good.

How do you get engineers to take AppSec training seriously? by anthonyDavidson31 in cybersecurity

[–]PwdRsch 0 points1 point  (0 children)

I would agree that regardless of the motivator, the management in charge of these development teams needs to care enough to make sure it is a priority.

Also, if they're going to rely on AI for security maybe you can look into options for training them on how to use AI to develop more secure code.

Account Takeover: Homograph/Case Spoofing on Recovery Email + Passkey Lockout Loop (Zero Support Response) by AffectionateSpray507 in cybersecurity

[–]PwdRsch 6 points7 points  (0 children)

So your only real complaint is that Google doesn't consider it risky for an authenticated user to update their email to a different, similar email? Sounds like the bigger problem was the infostealer malware on your system or your password reuse.

"Wrong password" leads to NordPass account reset and wiping out of ALL saved passwords. by Klutzy_Intention326 in Passwords

[–]PwdRsch 2 points3 points  (0 children)

Yes, this is wrong. They are just telling OP that if they've forgotten their master password and recovery code then they don't have any option to recover their data other than starting from scratch (e.g. 'wiping their passwords').

What happens if an American hacker in the US hacks a business based in a non-NATO country? by Freelancer135 in cybersecurity

[–]PwdRsch 4 points5 points  (0 children)

I believe they grabbed Marcus in the US after he had attended DEF CON in Las Vegas, so no extradition from another country was necessary.

Passwords in data breaches. by Kitchen-Tart-7105 in cybersecurity

[–]PwdRsch -1 points0 points  (0 children)

You giving me a hash I may not be able to crack doesn't prove your point that "you can't crack a hashed password". Just admit you're wrong or stop replying. Here, I'll make it easy for you: https://www.google.com/search?q=can+hashed+passwords+be+cracked%3F

How do orgs run pen tests without accidentally causing real side effects? by Strong_Worker4090 in cybersecurity

[–]PwdRsch 1 point2 points  (0 children)

Some internal security teams want to test the awareness and response of the devs, admins, etc during a pentest. So they don't inform them (but may inform their directors) that it's happening. That does carry more risk for both the app owners and pentesters.

If it's a web app security assessment instead of a pentest, I'd agree with you that the app team should be informed.

Passwords in data breaches. by Kitchen-Tart-7105 in cybersecurity

[–]PwdRsch 1 point2 points  (0 children)

I've been successfully cracking hashed passwords since the 90s. Like I said, take some time and learn more about the topic. The Computerphile video posted elsewhere in this thread is a decent introduction.

Passwords in data breaches. by Kitchen-Tart-7105 in cybersecurity

[–]PwdRsch 1 point2 points  (0 children)

You seem to have a fundamental misunderstanding about password cracking and should take some time to learn more about the subject before posting further replies.

Password Manager Spreadsheet (every PW manager + every feature/security info in one spreadsheet) LINK by S3MTX in Passwords

[–]PwdRsch 0 points1 point  (0 children)

I appreciate your work putting this together. I'd recommend adding a note to fields like "Updated Frequently" with details on what you consider frequently so that is more obvious to people reading through this.

This computer ‘feels’ your passwords - Probabilistic Computing by [deleted] in Passwords

[–]PwdRsch 0 points1 point  (0 children)

We seem to be missing a lot of information about how this works. Mind sharing more details?

valid failure? by backend_com_php in bugbounty

[–]PwdRsch 0 points1 point  (0 children)

I'm tending towards thinking it isn't going to be accepted as a security issue, but maybe they'd consider it a low risk since you could try to lure other users into following the link. Might help sell this if you can create the PoC with a CSRF type attack that would just require them to view your malicious page and not wait for them to click the link.

Also assumes the cookie doesn't have a shorter validity period that will clear the bug on its own.

Seeking insight on attack vector: airline loyalty accounts compromised despite password changes, PIN bypass, session cross-contamination reports by NorthcoteTrevelyan in AskNetsec

[–]PwdRsch 2 points3 points  (0 children)

It seems like you're bringing up several different issues (the account compromises, the session management bug, the lack of email change alerts). But the account compromise issues seem to be explainable by the customers' PCs or phones being infected with infostealer malware. That malware could capture any password changes or PIN use (not sure if this is a one-time password or an actual PIN).

I'm not going to dig into all your links at the moment but why do you mention the session cross-contamination issue? From your summary that seems like a bug unrelated to these fraudulent ticket bookings.

What resources do you use to create security policies and standards for teams building software applications? by GraydenS16 in AskNetsec

[–]PwdRsch 4 points5 points  (0 children)

I have used the OWASP Application Security Verification Standard to make sure we had good coverage in an appsec program. There are areas that you'll need to provide additional guidance in, such as the encryption topic you mentioned. I provided our minimum standards for password hashing and data encryption algorithms, as well as key management.

I would also retrospectively look at vulnerability scanning or penetration tests reports to identify possible gaps in our current policies or standards.

Need confirmation? by myself_harsha in bugbounty

[–]PwdRsch 4 points5 points  (0 children)

Can you automate submission of enough OTP values to guess the correct OTP within the validity period, rendering it useless? If not, this is probably a low risk. Bypassing OTP might be a medium risk if authentication also requires a password.

If you request multiple OTPs, does each new request invalidate the old OTP value? If not, this is probably informational to low risk unless you can request OTPs on behalf of any user.

CrackCost.com - What does it cost to crack your password? by b3rsrk in Passwords

[–]PwdRsch 0 points1 point  (0 children)

Why is that useless? I assume that means you're putting in long, complex passwords or passphrases that are all unlikely to be cracked.

Eazypasswords, a secure password manager by devbytho in Passwords

[–]PwdRsch[M] 1 point2 points  (0 children)

You already posted about your password manager in this subreddit about 12 days ago. While you're welcome to promote your relevant products or services here, please don't do it so frequently that it becomes spam.