- Joined
- May 29, 2023
i can hear the boss music from those hackers salivating at such a opportunity.Additional contribution:
At some point I determined that passwords stored on the server for all user accounts were duplicated and locally stored on client devices that had the company software, and hashed with SHA-256(I think, IDR, but it was common), and all easily viewed in the local SQL database for the software. All the passwords were just sitting there, which seems like kind of a big flaw to me, but I'm just a know-nothing nerd under 50. Response to this was basically "Well, does anybody other than you know how to do that? No? Non-issue." Maybe I am full of shit, but I'm pretty sure it's a bad idea. Just off the top of my head, from my education, I thought you were supposed to hash a password the user entered, send it to the server, and compare it to the hash stored on the server for that user.
Thank god I wasn't in an actual cybersecurity role, I'd probably have lost my mind.
i legitimately hope that something has been done about that, even script kiddies know NOT to have sensitive info on the end clients.
because that is how data breaches start.