2019
DOI: 10.1016/j.cose.2019.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of password hashing schemes in open source web platforms

Abstract: Nowadays, the majority of web platforms in the Internet originate either from CMS to easily deploy websites or by web applications frameworks that allow developers to design and implement web applications. Considering the fact that CMS are intended to be plug and play solutions and their main aim is to allow even non-developers to deploy websites, we argue that the default hashing schemes are not modified when deployed in the Internet. Also, recent studies suggest that even developers do not use appropriate ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 16 publications
0
15
0
2
Order By: Relevance
“…It can be seen from the data that there were attempts to block or to takeover the control of the websites. Further analysis of the attack report clearly shows a large number generic attacks, exactly as we expected, aimed at the well-known address of the WCMS administrative panel, which is generally open, and which often has no available option to change [22]. This was the case with the Elxis WCMS observed, in which the security system collected this information because the attacker requested to log into a non-existent URL, and eventually the system detected it as a "Directory traversal attack".…”
Section: Analysis Of the Resultsmentioning
confidence: 61%
“…It can be seen from the data that there were attempts to block or to takeover the control of the websites. Further analysis of the attack report clearly shows a large number generic attacks, exactly as we expected, aimed at the well-known address of the WCMS administrative panel, which is generally open, and which often has no available option to change [22]. This was the case with the Elxis WCMS observed, in which the security system collected this information because the attacker requested to log into a non-existent URL, and eventually the system detected it as a "Directory traversal attack".…”
Section: Analysis Of the Resultsmentioning
confidence: 61%
“…As today's technology evolves, it has been found that many CMS frameworks and web applications use outdated hash functions, an arbitrary number of hash iterations. Notably, popular WordPress still uses MD5 with low hash iterations [18]. So in verifying the data security integrity of this certificate, SHA-256 hashing is applied which is more qualified.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The research has examined some types of attacks that are effective against the current algorithm, such as dictionary attacks, the rainbow table attacks, and brute force attacks. Researchers have discussed the weakness in the solutions that are currently used to solve the weakness of the MD5 algorithm in Web applications [12].…”
Section: Introductionmentioning
confidence: 99%