cryptochecktool

Results 15 issues of cryptochecktool

https://github.com/proswdev/mongoose-bcrypt/blob/master/index.js#L29 The iteration count for the salt should be at least 10.

The salt should not be set as a static variable, as this will lead to reduced security. See https://github.com/richardpenman/browsercookie/blob/9d5e80788504c8b950bda31e377585252d7abc31/browsercookie/init.py#L106 for the reference.

At the location https://github.com/node-red/node-red-admin/blob/master/lib/commands/hash.js#L27, the encryption of the salt with bcrypt.hashSync(password, 8) should have a loop count of at least 10 to ensure sufficient security.

The generatePassword function currently utilizes Math.random() to generate passwords. However, Math.random() is not a secure method for generating random numbers as it is a pseudo-random number generator, which is susceptible...

In your code: [https://github.com/mirror/jdownloader/blob/f274b29897aad2e0ff0d4fd148e42aadf8b622fa/src/org/jdownloader/container/D.java #L322](https://github.com/yoyiyi/SoleilNotes/blob/4db41a9d68a2f3ed2a07739a547af9f625f9c799/%E5%AF%86%E7%A0%81%E5%AD%A6/003.%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86.md?plain=1#L185) Use IV=key. But iv should be set to a sufficiently random number, otherwise it will lead to a CPA attack. If IV=key, then CCA attacks...

The method of using hash: Use SHA1 to locate unique identifiers for Lua scripts. Possible exploitation method: Construct two different Lua scripts, A and B, with the same hash value....

Enhanced Security: SHA-256 offers a significantly higher level of security compared to MD5, mitigating potential vulnerabilities such as collision attacks. This upgrade ensures robust protection for sensitive data. Performance Boost:...

In your code: [https://github.com/mirror/jdownloader/blob/f274b29897aad2e0ff0d4fd148e42aadf8b622fa/src/org/jdownloader/container/D.java #L322](https://github.com/7040210/SuperBoot/blob/91ee57cc736937e8fbddd24cb5cf50102eb70345/super-boot-utils/src/main/java/org/superboot/utils/DESUtil.java#L38) Use IV=key. But iv should be set to a sufficiently random number, otherwise it will lead to a CPA attack. If IV=key, then CCA attacks...

一、漏洞摘要 joyrpc中的加密代码使用了IV=key的模式,从而会导致CCA攻击,进而让攻击者获取密钥。 https://github.com/jd-opensource/joyrpc/blob/ff7bbce76a5ba2542935707c0147a4c0008e3965/joyrpc-core/src/main/java/io/joyrpc/codec/crypto/aes/AesCrypto.java#L45-L49 二、复现步骤:逻辑清晰,步骤严密 截获密文:攻击者截获一段使用IV = Key加密的密文C = (C1, C2, C3, ..., Cn)。 构造特制密文:攻击者构造一个新的密文C' = (C1, 0, C1, C2, C3, ..., Cn),其中0表示一个全零的块。 解密过程:解密C1时,P1 = AES_decrypt(C1, Key) XOR Key。解密第二个块时,P2 = AES_decrypt(0,...

Hello, please do not use ECB mode when encrypting with AES, as this may lead to information leakage. https://github.com/libkeepass/pykeepass/blob/b94fee3aa55d159cbf56390d7e28ecf664625e2b/pykeepass/kdbx_parsing/common.py#L107