Why reset passwords for salted hash leaks?
4 points| rifung | 4 years ago
I feel like I'm missing something obvious but given that they only stored a salted hash, how can hackers get your password? My understanding is that using a salted hash should prevent them from using either a rainbow table or dictionary attack.
LinuxBender|4 years ago
[1] - https://stackoverflow.com/questions/6776050/how-long-to-brut...
[2] - https://hashcat.net/forum/thread-4429.html
DevopsTux|4 years ago
Salting, specifically only has one function: making rainbow tables useless and difficulting hash analisys, it is the deffinition of buying you time and making the attacker think twice by requiring more resources (ideally enough that it;s not worth trying)
So, if you know that your users creds are compromised, the only logical answer is to reset them. What you did when hashing is buying time. The difference is that if you bought enough there is little change of incidents from the leak. If you didn't it may get messy. And will.
unknown|4 years ago
[deleted]
Matthias1|4 years ago
People were saying "reset your password" as soon as they saw they saw the headline "Twitch Leak." Which is perfectly fair and probably good advice.
That being said, I haven't even seen it confirmed that the leak contained passwords or user data.
Edit: Twitch says "At this time, we have no indication that login credentials have been exposed." https://blog.twitch.tv/en/2021/10/06/updates-on-the-twitch-s...