• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

Seems like NickFitz was right - Telegraph hacked

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    Seems like NickFitz was right - Telegraph hacked

    Someone in their IT department is for the high jump, following an SQL injection exploit.

    Story (discussion by the hackers themselves actually) here and another article here.

    It's almost unbelievable that anyone these days would neglect to properly encode client-derived strings in SQL statements.
    Last edited by OwlHoot; 9 March 2009, 01:35.
    Work in the public sector? Read the IR35 FAQ here

    #2
    Passwords in the database as plain text?

    FFS...

    Comment


      #3
      They should have employed NickFitz......

      Comment


        #4
        Today's headline

        A PHP + MySql website in totally unsecure shock horror!


        Comment


          #5
          question for Nick

          am I right in saying that the client is used to encrypt/decrypt the pwd, and the result can be stored , say, as a varchar ?


          if you can hear a funny noise, it's my @rse hole twisting


          (\__/)
          (>'.'<)
          ("")("") Born to Drink. Forced to Work

          Comment


            #6
            Originally posted by EternalOptimist View Post
            question for Nick

            am I right in saying that the client is used to encrypt/decrypt the pwd, and the result can be stored , say, as a varchar ?


            if you can hear a funny noise, it's my @rse hole twisting


            The usual practice is to store only a hash (MD5 or SHA etc) of the password, and compare this with hashes (using the same scheme) of password attempts submitted by the client.

            The chance of a hash collision with a different submitted string of reasonable length is so remote it can be ignored.
            Work in the public sector? Read the IR35 FAQ here

            Comment


              #7
              Originally posted by OwlHoot View Post
              The usual practice is to store only a hash (MD5 or SHA etc) of the password, and compare this with hashes (using the same scheme) of password attempts submitted by the client.
              Yup. This is exactly how PIN numbers on your Chip & PIN card work. The encrpytion key and encrypted answer are stored on the Chip, but not the actual PIN number.

              It's one of those mechanisms whereby you cannot reverse-engineer the "answer" to the "question" even if you have the encryption code.

              Comment


                #8
                Originally posted by BlightyBoy View Post
                Yup. This is exactly how PIN numbers on your Chip & PIN card work. The encrpytion key and encrypted answer are stored on the Chip, but not the actual PIN number.

                It's one of those mechanisms whereby you cannot reverse-engineer the "answer" to the "question" even if you have the encryption code.
                so what would a hash of 'password' look like, and can i store it in a varchar

                (i am building a back end for some app devs- long story)


                (\__/)
                (>'.'<)
                ("")("") Born to Drink. Forced to Work

                Comment


                  #9
                  Originally posted by EternalOptimist View Post
                  so what would a hash of 'password' look like, and can i store it in a varchar

                  (i am building a back end for some app devs- long story)


                  An apparently random sequence of alphanumeric characters of variable length but with fixed bounds.
                  "Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.

                  Comment


                    #10
                    Originally posted by DaveB View Post
                    An apparently random sequence of alphanumeric characters of variable length but with fixed bounds.
                    merci
                    (\__/)
                    (>'.'<)
                    ("")("") Born to Drink. Forced to Work

                    Comment

                    Working...
                    X