Newbie question about password hashing

mxmaniac

Member
Dec 8, 2013
29
0
0
This may be an over simplified question, but I recently have read a lot about hashing of passwords and it made me wonder. Since passwords are hashed, do most websites or any admins in general have no way to know what your password is even on their own system?

For example, I always used to think, you sign up for yahoo mail, the almighty admin guys know your password. If one of those guys was a crook, he could easily think "hey, this guy probably uses that password for everything, lets try his bank account". But now that I hear about password hashing I wonder if that is true, or if it all happens so securely even the admins can't find it out?

And if so, what about local networks? Can the IT guys at most companies see most employees passwords, or are they securely incrypted/hashed in such a way that the IT guys can't even know?
 

MustISO

Lifer
Oct 9, 1999
11,928
12
81
Any decent system would not reveal the password when it's stored. In a company environment, no one can see what the password is currently set to. They can change it but can't see it in plain text without "cracking" it with software.
 

Mark R

Diamond Member
Oct 9, 1999
8,513
14
81
A decent system should hash (*) the passwords, so that only the hash is stored. This way, if the database is breached, the password itself cannot be recovered.

However, incompetently designed systems are common. Anything from a well known commercial company (e.g. MS, Apple, etc.) in general will use best practice. The problem comes with niche or specialist or custom software where developers may not be aware of best practice for security.

For example, medical software is a very niche market, so the developers often have to get a product to market at minimum cost while verifying the basic functions, so they don't put much effort into security. I've seen plain text passwords stored in databases so the admin could find them, and I've seen weakly (so weak that I could crack it with a pen and paper) encrypted login details cached on the local desktop system, so any user could read them

(*) - Although using a conventional hash (like MD5 or SHA1, etc.) is very common. This is not a good idea, because hashes are designed to be fast. As passwords don't need to be checked often, it's better to use a very complex algorithm (like PBKDF2 or a hash repeated 100 times).
 

Mushkins

Golden Member
Feb 11, 2013
1,631
0
0
Unless a sysadmin is shady, they dont *want* to know your password. If they know your password, accountability goes right out the window. They want to be able to look at the logs and go "John Smith was logged into that PC from 9am to 5pm." They absolutely don't want to be able to go "maybe John Smith was logged in, or maybe it was me because I have his credentials."

Having the finger pointed at you and having to prove it *wasnt* you who did XYZ on a corporate PC is not a fun game to play. We don't want to be potentially liable for a data breach, not knowing your users passwords is a pretty big "cover your ass" point when it comes to user accountability. Sysadmins dont need it, they can reset it or use their own admin credentials to get in.

That being said, no, the Yahoo mailserver admins aren't sitting there skimming through your private emails all day. They're too busy actually administering mailservers to snoop on strangers. However, there are definitely people with direct access to the mail database that *can* see your mail, and they're absolutely doing datamining on the whole of the mail database that you consented to via the ToS of the service. Selling that datamined info is how they profit by giving you a free service, just like gmail, facebook, twitter, and all the rest. Expect no privacy from someone elses servers.
 
Last edited:

SecurityTheatre

Senior member
Aug 14, 2011
672
0
0
To be fair, most systems use weaker hashes such as MD5.

This hash type is vulnerable to all sorts of cracking attacks including full key-space rainbow tables, allowing the cracking of passwords of nearly arbitrary complexity.

Ideally, someone would use a good hashing algorithm like SHA3 or RipeMD along with a keystretching algorithm like bcrypt.

This makes cracking even simple passwords a rather strenuous task, but is still easy for a system to process forward authentication.

In this case, with a strong password, you can really believe that administrators cannot read your password.

Keep in mind, even in systems with strong password hashing, such as SHA3, provided they aren't salting or stretching, you can simply take that hash and apply it to certain other types of systems that use a similar algorithm.

Windows is subject to this. It uses a hash called NTLM and you can simply take the hash (without bothering to crack it) and log into another system using the raw hash. In this way, you can hop between systems that have the same password, without ever knowing the password. It's a glorious oversight for hackers.

Enjoy!
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |