This Happened
From: webmaster@jankymb.com
To: Ron Rothman <ron@gmail.com>
Subject: New Message at JankyMB!
Dear rrothman,
You have a new message waiting for you at
jankymb.com!
Login: rrothman
Password: qwertymonkey
Enjoy,
The JankyMB Team
http://www.jankymb.com/login
Then, This Happened
Per your recent online request your Sprint
Local online password has been reset. Your
login information is below. Please make
note of this information for future
reference.
User ID: rothman_ron
Password: qwertymonkey
Storing Passwords, First Try
user name password
rrothman qwertymonkey
john_blossom mysecret!
alfredo83 PASSWORD123
... ...
"Information such as customers'
account Personal Identification
Numbers (PINs) may have been
compromised."
"Potentially affected information
could include names, usernames, email
addresses, passwords, and, if
optionally provided to us, dates of
birth, phone numbers, and mailing
addresses."
Storing Passwords, Third Try
user name password (hashed)
rrothman 2c200cbe66e5caab514e6ff28cc
bfa885b497d1c
john_blossom e234dfe7d6b680130064ad79d89
065c114ea9e8c
alfredo83 23264aa6268488c2909ef81ead4
9e09e248d5d91
... ...
Storing Passwords, Third Try
user name password (hashed)
rrothman 2c200cbe66e5caab514e6ff28cc
bfa885b497d1c
john_blossom e234dfe7d6b680130064ad79d89
065c114ea9e8c
alfredo83 23264aa6268488c2909ef81ead4
9e09e248d5d91
... ...
supercool99 2c200cbe66e5caab514e6ff28cc
bfa885b497d1c
same
Let's Hash and Salt
hash 76E244090E857E12E
7AA3A69FCF650C2
qwertymonkey
hash 76E244090E857E12E
7AA3A69FCF650C2
qwertymonkey
Upon sign-up
Upon login
salt
salt
match!
Storing Passwords, Fourth Try
user name salt password (hashed & salted)
rrothman d65f e7bb657153bcfe9c04da81d07e
2e0dce86b12925
john_blossom 0798 aa422dc60e5aa9e7199b5934be
d67f597253b845
alfredo83 3b74 e8f3ba3e077869953b168ea5d6
7f5db87348a702
... ... ...
supercool99 09fa ccacc8b06be9779d5966af139f
2c56a5bf53a076
different
different
References
1. Sprint customer accounts breached by hackers
2. Evite e-invite website admits security breach
3. Password Security: It’s Not That Hard (But You Still Can’t Get
It Right)
Mitigations
● Don't use a common password.
● Don't reuse passwords.
● Use 2FA.
● Use SSO where possible.
● Self-salt.