Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


How is submitting passwords in plain text vulnerable? filter_list
Author
Message
How is submitting passwords in plain text vulnerable? #1
Alright, given the following restrictions, how would someone go about stealing a password from a user logging in?

Password is submitted as a GET request, ex:
GET somewebsite.com/u=Username&p=Password

The user is on a home network, with wifi disabled (no one else is on the network to MiM or sniff traffic)

The user does not have a virus/trojan/keylogger on his/her computer

If anyone cares, I'm not trying to hack anyone, I'm making a web server and want to know if I really need to go through the trouble of figuring out https

Thanks for your time.
[Image: jWSyE88.png]

Reply

RE: How is submitting passwords in plain text vulnerable? #2
They capture packets on any one of the 10ish servers the data gets routed through to reach the server.

If it's free, use HTTPS. If it isn't, don't bother, as self-signed certs are next to useless.

Reply

RE: How is submitting passwords in plain text vulnerable? #3
I'm making the server, so it just costs time, and it'll be self-signed anyway.

But it's important that it is secure...
[Image: jWSyE88.png]

Reply

RE: How is submitting passwords in plain text vulnerable? #4
How secure? If an attacker can MITM an ISP, they can also fake a self-signed certificate.

Reply

RE: How is submitting passwords in plain text vulnerable? #5
Even though this is almost just as insecure as using GET, use POST. At least it would stop people from simply seeing the password in the URL.
[Image: BAvhP6h.png]
Code:
[5:42:25 PM] i0xillusi0n: Breshie don't bust a nut over chloe now
[5:42:31 PM] Entity: fapfapfapfapfapfapfapfapfapfap
[5:42:33 PM] Jigglypuff | SL: EWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW

Reply

RE: How is submitting passwords in plain text vulnerable? #6
First of all you should know and use HTTPS no matter what.

If you send an username and password to the server in clear text it can be seen by anyone in your route to the server performing a man in the middle attack.

(04-01-2013, 02:59 AM)i0xIllusi0n Wrote: Even though this is almost just as insecure as using GET, use POST. At least it would stop people from simply seeing the password in the URL.
This is still nowhere safe, contents of the POST body will still be visible in clear text if sent through just HTTP. You would have to use HTTPS to prevent that.

If you absolutely don't want to use HTTPS then implement some sort of clientside Javascript password hashing algorithm (i.e md5) into your login form so they won't be sent in clear text.
[Image: c3b49a2498146aaf6938bc6961edb025.png]

Reply

RE: How is submitting passwords in plain text vulnerable? #7
you may as well just put your plain passes on a plate and give it to sabu over here and he'll get busted by the feds and ur data is then safe.

Reply

RE: How is submitting passwords in plain text vulnerable? #8
(04-01-2013, 01:42 PM)Sabu Wrote: First of all you should know and use HTTPS no matter what.

If you send an username and password to the server in clear text it can be seen by anyone in your route to the server performing a man in the middle attack.

(04-01-2013, 02:59 AM)i0xIllusi0n Wrote: Even though this is almost just as insecure as using GET, use POST. At least it would stop people from simply seeing the password in the URL.
This is still nowhere safe, contents of the POST body will still be visible in clear text if sent through just HTTP. You would have to use HTTPS to prevent that.

If you absolutely don't want to use HTTPS then implement some sort of clientside Javascript password hashing algorithm (i.e md5) into your login form so they won't be sent in clear text.

No shit sherlock, I clearly said "Even though this is almost just as insecure". Everybody knows that doesn't fix anything.

Learn to comprehend what I said.
[Image: BAvhP6h.png]
Code:
[5:42:25 PM] i0xillusi0n: Breshie don't bust a nut over chloe now
[5:42:31 PM] Entity: fapfapfapfapfapfapfapfapfapfap
[5:42:33 PM] Jigglypuff | SL: EWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW

Reply







Users browsing this thread: 1 Guest(s)