3
A little while ago I needed to figure out which hash had been used to save passwords in the bank so that they were not directly saved according to what the user launches at the time of their registration. Searching I found the following website, that if you know the initial password you can see the results that the hash’s will generate on top of that password. it seemed to me somewhat vulnerable because as soon as I discovered which Hash had been used, and as I have access to the bank where the password is saved, it was enough that I compared what was stored in the bank with what the site generated me and so I found out which Hash had been used.
My point is:
How far to use a string salt in the original password helps to make the password even more secure, because it would be necessary to access the bank and have access to passwords would be necessary to know which chain salt was used, making it more difficult to find out which original password was registered by users.
Wow, you yourself have already answered your doubts => necessary in addition to accessing the bank and having access to passwords would be necessary to know which chain salt was used
– MarceloBoni
My question is, if it really makes a difference to use a Salt string on top of the original password before applying the Hash, because nowadays a hash is applied on top of the registered initial password and is already saved in the direct bank, this can be something vulnerable
– R.Santos
What algorithm are you using? SHA1? SHA512?
– Paulo Sérgio Duff
@Paulosérgioduff SHA 256
– R.Santos
It is a good question this yours. I believe that all the points raised are already answered with details in How to hash passwords securely?,
– Bacco