Password ProTip

Dec 6, 2023 4:10 PM

Dragelet

Views

55091

Likes

696

Dislikes

14

security

computers

life_hacks

Imagine you are a super hacker and you get a dump of data. It breaks partway through. You figure out that one specific person did this, possibly on purpose to mess with you. Doesn't that create incentive for you to be targeted in particular?

2 years ago | Likes 1 Dislikes 0

better not be storing my password not hashed

2 years ago | Likes 2 Dislikes 0

That's juvenile. My password is "Incorrect" so if I mistype it I get a reminder

2 years ago | Likes 1 Dislikes 0

Whar is a CSV and is this post actual advice or troll?

2 years ago | Likes 1 Dislikes 0

Passphrase > password https://www.useapassphrase.com/

2 years ago | Likes 3 Dislikes 0

Pft, amateur hour, insert a buffer overflow attack into your password instead that nukes the whole machine from inside the CSV file.

2 years ago | Likes 6 Dislikes 1

and how would you do that? asking for some friends

2 years ago | Likes 3 Dislikes 0

False. Good software double quotes strings when generating CSV data, thus protecting against commas. Try using a double quote instead. But that won't work either, if they escape double quotes in strings properly. Not all software does, but many do.

2 years ago | Likes 1 Dislikes 0

Good software doesn't use CSV files for storing passwords.

2 years ago | Likes 2 Dislikes 0

do passwords allow for it?

2 years ago | Likes 36 Dislikes 0

Good passwords allow that and more. https://owasp.org/www-community/password-special-characters

2 years ago | Likes 31 Dislikes 0

not all. I've frequently encountered systems that didn't allow for non-alphanumeric letters and some even enforced specifics like "Has to start with a capitalized letter". one such system was a Visa or Mastercard provider for a while

2 years ago | Likes 4 Dislikes 0

yeah

2 years ago | Likes 1 Dislikes 0

Yeah, but they only allow 3 wrong tries before they freeze the account.

2 years ago | Likes 1 Dislikes 0

Password must contain at least 43 characters. Password must contain at least one capital letter. Password must contain at least one number. Password must contain at least one special character. Password must contain at least one Aztec pictograph. MY GOD JUST TELL ME WHAT YOU WANT UP-FRONT!!!

2 years ago | Likes 2 Dislikes 0

Certified Shrimp Vagina?

2 years ago | Likes 3 Dislikes 0

yes.

2 years ago | Likes 3 Dislikes 0

use | " ' \ % _ as well

2 years ago | Likes 1 Dislikes 0

Why is CVS losing my data?

2 years ago | Likes 3 Dislikes 0

CSV is a delimited text file. It's not the pharmacy chain.

2 years ago | Likes 1 Dislikes 0

yeah if they are not cleaning that input, i do not feel sorry

2 years ago | Likes 2 Dislikes 0

My password is ,%", take that u h4x0r scum! Of course no one's going to be able to brute force your hash, so maybe you should make that your username instead?

2 years ago | Likes 2 Dislikes 0

It's pretty easy to write code to find commas in passwords and ignore them.

2 years ago | Likes 1 Dislikes 0

(system) new password must contain a symbol (me) *adds a symbol* (system) not that one (me) *tries different symbol* (system) and not that one.. in fact here's the only 3 symbols we allow (me) Then why the F didn't you tell me that from the start, you whack-a-mole piece of shit? (system) because fuck you, that's why

2 years ago | Likes 15 Dislikes 0

I use a non-English keyboard and use accent marks. If you want my password it's going to take just a little bit of extra work lol

1 year ago | Likes 1 Dislikes 0

Stupid

2 years ago | Likes 1 Dislikes 0

No you gotta put a quote and then a comma

2 years ago | Likes 1 Dislikes 0

It will have quotation marks around it. Parsers will be fine. But good thinking.

2 years ago | Likes 1 Dislikes 0

Unless those crafty fuckers use encapsulating quotes. That's why all MY passwords use '","' in them!

2 years ago | Likes 4 Dislikes 0

What if they also escape the quotes? Yet use a csv to store passwords unhashed.

2 years ago | Likes 1 Dislikes 0

Unfortunately for this joke, but fortunately for all those involved in data processing, the CSV format can escape commas, so this won't work.

2 years ago | Likes 117 Dislikes 4

[deleted]

[deleted]

2 years ago (deleted Dec 8, 2023 9:59 AM) | Likes 0 Dislikes 0

This comment is a test. Please ignore.

2 years ago | Likes 1 Dislikes 0

The CSV format can escape commas. A programmer whose idea of security is dumping passwords in a CSV can't.

2 years ago | Likes 4 Dislikes 0

Oh, I think the implied context for CSV dumps are when a security breach happens at a company, some hacker gets ahold of a customer password list, and they publish or sell it. I think those are often in the CSV format.

2 years ago | Likes 3 Dislikes 0

Ah, I was assuming this was used as a safe password storage, which wouldn't surprise me a lot tbh... Yeah, one would expect that a script kiddie smart enough to hack away a password list will have considered this corner case, but maybe not. I've seen a lot of careless programming.

2 years ago | Likes 2 Dislikes 0

Use the ascii password bear /"\;;,;;/"\

2 years ago | Likes 3 Dislikes 0

"Good Point.","Unfortunately, some people","won't understand."

2 years ago | Likes 6 Dislikes 0

"can" escape commas isn't the same as "every implementation of CSV format escapes commas correctly" *grumbles in bank files that keep breaking*

2 years ago | Likes 75 Dislikes 0

Yeah, I hear that.

2 years ago | Likes 2 Dislikes 0

... or read them correctly. Years ago I had so much misery from CSV escaping not working correctly in one of Open Office, Excel, or Google Sheets that I gave up on exporting user data in anything but native xlsx files instead.

2 years ago | Likes 3 Dislikes 0

...flashbacks of COBOL nightmares.

2 years ago | Likes 4 Dislikes 0

Preach brother (cursing in software for county tax files).

2 years ago | Likes 9 Dislikes 0

Also a lot of data processing moved to pipe breaks for this exact reason, and I have yet to encounter a password field that lets me use those

2 years ago | Likes 21 Dislikes 0

Anyone who makes a password field that *doesn't* let you use those needs a solid slap in the face, and perhaps a kick in the 'nads. Same with anyone who puts a maximum length limit on a password. Your security-critical code is trash and you belong in the trash.

2 years ago | Likes 4 Dislikes 0

Gotta love those "can't have more than x numbers or letters aligned, maximum 12 characters" passwords... Just let me input a whole sentence ffs!

2 years ago | Likes 4 Dislikes 0

It's always financial accounts, too. Some random web site set up by a single moron will let you enter a long, complex password, and your bank will insist on no more than 12 characters.

2 years ago | Likes 3 Dislikes 0

See sections 2.5, 2.6 and 2.7 of RFC 4180. The CSV standard already defines how to deal with commas and line breaks

2 years ago | Likes 12 Dislikes 0

Oh definitely, but laziness is a lot easier than dealing with character escapes

2 years ago | Likes 7 Dislikes 0

Sorry... Touched a nerve there. Had an argument with a co-worker last week because of this. He's written his own "parser" (string.split(','), but he calls it a parser) and caused a prod incident but "it's impossible to have commas in the value of a CSV" and "line breaks in values are an edge cases".

2 years ago | Likes 4 Dislikes 0

Yup, which is why some switched to the pipe instead of the comma. Much less likely to cause an incident, but still just as lazy.

2 years ago | Likes 4 Dislikes 0

That's infuriating. There's a million csv parser libraries readily available, this is a solved problem

2 years ago | Likes 2 Dislikes 0

Plain text credentials that should not be accessible?

2 years ago | Likes 23 Dislikes 0

"should" is the operative word here

2 years ago | Likes 3 Dislikes 0

I've seen a few sites secure the password in the database using good enough security (salt+modern hash), but their logger logs all incoming data, including the passwords, in plain text. Security is hard.

2 years ago | Likes 5 Dislikes 0

You'd be amazed how many sites store your password in plain text. Or hash it, but don't salt it.

2 years ago | Likes 15 Dislikes 0

Just like when cooking. Hash without Salt is a war crime.

2 years ago | Likes 1 Dislikes 0

Needs pepper too.

2 years ago | Likes 3 Dislikes 0

Or just encrypt it and don't hash it.

2 years ago | Likes 2 Dislikes 0

I used to use an xss attack that redirects to lemonparty (by way of a proxy url I could track hits to) as my password. Every time it was hit I’d know what service it was so I could change the random noise at the end of that password, and I’d know whomever viewed it got what they deserved.

2 years ago | Likes 270 Dislikes 1

Meatspin would be epic, and you can publish the high score winners.

2 years ago | Likes 2 Dislikes 0

How many times?

2 years ago | Likes 27 Dislikes 0

You don’t still do this?

2 years ago | Likes 65 Dislikes 0

2 years ago | Likes 150 Dislikes 0

Doesn’t work much anymore. That’s because many rinkydink sites use 3rd party sign on today (facebook, google, whatever); or if they don’t, they use updated frameworks with decently secured logins and databases; and the password harvesting meta has moved away from single finely crafted sql injections to other methods to access databases. It just isn’t worth the effort anymore.

2 years ago | Likes 85 Dislikes 0

You should post ways folks can beef up personal internet security in the present… it’s totally bewildering to lots of us and is growing more and more critical…

2 years ago | Likes 1 Dislikes 0

Use a unique password for every website. Can’t handle that? Use a password manager. Can’t handle that? Use a different password for each bank/credit/email/social and then the same password for junk sites with no power. Can’t handle that? Use the same unique password for bank/credit/email and a different one for everything else. Can’t handle that? Expect to get hacked eventually and lose all your money.

2 years ago | Likes 1 Dislikes 0

I'd argue that if you can make one unsuspecting person see lemonparty it's worth the effort. I did it with Goatse for someone at work who shut their computer off and needed me to turn it on so he could RDP in. He RDPed in to a surprise.

2 years ago | Likes 14 Dislikes 18

One thing to send hackers or shitty site owners to lemonparty; it is entirely another thing to assault a coworker that did nothing wrong. Grow up.

2 years ago | Likes 32 Dislikes 11

Or gosh, maybe we were friends and I knew him really well and he thought it was hilarious. I didn't do it to Jane in accounting. It was an office of five people and we did dial-up Internet tech support. You're gonna hurt your knee if you keep jerking it like that.

2 years ago | Likes 20 Dislikes 13

This is only true for plain text, most passwords are stored in a 256 sha.

2 years ago | Likes 8 Dislikes 0

And when they're dumped in a CSV, they're de-sanitized and made into plain text.

2 years ago | Likes 1 Dislikes 0

Theyre probably referring to the dumps where passwords were either stored wrong or less than 12 characters and got cracked.

2 years ago | Likes 5 Dislikes 1

I'm not sure I'd say most systems do. Every now and then there are reports of sites whose "passwords got stolen", which shouldn't happen if they're properly salted and hashed.

2 years ago | Likes 1 Dislikes 0

Make sure to include 'bedbugs' in your password, so nobody wants to touch it.

2 years ago | Likes 1 Dislikes 0

Thanks, Bobby Drop-Table

2 years ago | Likes 514 Dislikes 1

I lol'd irl

2 years ago | Likes 6 Dislikes 1

2 years ago | Likes 69 Dislikes 0

Still one of the funniest XKCDs ever

2 years ago | Likes 6 Dislikes 0

Also, why the hell aren't they getting backed up?

2 years ago | Likes 14 Dislikes 0

The same reason that they didnt sanitize their database inputs.

2 years ago | Likes 11 Dislikes 0

2 years ago | Likes 4 Dislikes 0

Douglas Null

2 years ago | Likes 15 Dislikes 0

My manager at work’s last name actually is Null. They have some amazing stories of the issues it has caused them over the years

2 years ago | Likes 13 Dislikes 0

2 years ago | Likes 9 Dislikes 0

Top shelf xkcd.

2 years ago | Likes 6 Dislikes 0

Like I tell everyone; use a proper csv library. You cannot just split by comma and expect it to work - there are more rules than that. And for passwords, there's surely folks with backslashes which escape characters so it's unlikely that this attempt would work because you'd quickly find failures if you didn't sanitize your data or process it via the rules.

2 years ago | Likes 2 Dislikes 0

Except if it's dumped, it's in quotes and the commas count as part of the string.

2 years ago | Likes 13 Dislikes 0

Look, if someone is careless enough to program a system that stores passwords in a CSV file in the clear, I doubt they'll be careful enough to escape them.

2 years ago | Likes 2 Dislikes 0

That's how it should be, but in many cases...

2 years ago | Likes 6 Dislikes 0

So you're saying put one quote in your password to act as the closing quotation in order to break it?

2 years ago | Likes 6 Dislikes 0

Ask little bobby tables' mom for more tips: https://xkcd.com/327/

2 years ago | Likes 3 Dislikes 0