R
R
Rustam Azizov2019-10-29 18:03:42
Information Security
Rustam Azizov, 2019-10-29 18:03:42

What do you mean by "leaked base"?

Taking on the writing of the backend, each time I deal with the issue of hashing passwords - standard measures. And although it is approximately clear to me for what scenarios this is done, it is not clear to me how this can help protect data from unauthorized changes. If an intruder gets enough access to "steal" it from the server, then can't he change the data as he sees fit directly? What is the emphasis on, that the cracker will get confused in the business logic? Or is it somehow limited in actions by the server configuration (if so, why does it allow it to read the database)? Or does he not have access to the database itself, only the ability to get its dump? In general, if you have experience, please describe briefly the possible hacking process and how hashing helps in this case - I will be grateful. Google didn't turn up anything useful.

Answer the question

In order to leave comments, you need to log in

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question