Skip to content

Commit

Permalink
Update A02_2021-Cryptographic_Failures.md
Browse files Browse the repository at this point in the history
- How to prevent: added key usage and protection
- Scenario #3: file downloas flaw instead of file upload flaw
  • Loading branch information
sslHello authored Sep 22, 2021
1 parent d8be91a commit 43a30a5
Showing 1 changed file with 5 additions and 2 deletions.
7 changes: 5 additions & 2 deletions 2021/docs/A02_2021-Cryptographic_Failures.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,10 @@ Do the following, at a minimum, and consult the references:
- Make sure to encrypt all sensitive data at rest.

- Ensure up-to-date and strong standard algorithms, protocols, and
keys are in place; use proper key management.
keys are in place; use keys only for one service (e.g. *not* https *and* smtps),
restrict the domain of key usage; manage or host your keys as organisation, at
least for information with the highest protection needs; protect all keys against
unauthorized access and export; use proper key management.

- Encrypt all data in transit with secure protocols such as TLS with
perfect forward secrecy (PFS) ciphers, cipher prioritization by the
Expand Down Expand Up @@ -142,7 +145,7 @@ above they could alter all transported data, e.g., the recipient of a
money transfer.

**Scenario #3**: The password database uses unsalted or simple hashes to
store everyone's passwords. A file upload flaw allows an attacker to
store everyone's passwords. A file download flaw allows an attacker to
retrieve the password database. All the unsalted hashes can be exposed
with a rainbow table of pre-calculated hashes. Hashes generated by
simple or fast hash functions may be cracked by GPUs, even if they were
Expand Down

0 comments on commit 43a30a5

Please sign in to comment.