Author Topic: CSV: plaintext offenders  (Read 885 times)

rcjordan

  • I'm consulting the authorities on the subject
  • Global Moderator
  • Hero Member
  • *****
  • Posts: 16420
  • Debbie says...
    • View Profile
CSV: plaintext offenders
« on: March 01, 2019, 06:21:21 PM »

ukgimp

  • Global Moderator
  • Hero Member
  • *****
  • Posts: 2241
    • View Profile
Re: CSV: plaintext offenders
« Reply #1 on: March 01, 2019, 10:48:46 PM »
Ahrefs email me my PW. Wtf.

rcjordan

  • I'm consulting the authorities on the subject
  • Global Moderator
  • Hero Member
  • *****
  • Posts: 16420
  • Debbie says...
    • View Profile
Re: CSV: plaintext offenders
« Reply #2 on: March 01, 2019, 11:01:21 PM »
>email

Quote
If you set up an account and the site sends you an email which lists your password, it’s likely stored in plaintext.

How to Tell If a Site Stores Passwords as Plaintext
https://www.makeuseof.com/tag/sites-passwords-plaintext/

littleman

  • Administrator
  • Hero Member
  • *****
  • Posts: 6558
    • View Profile
Re: CSV: plaintext offenders
« Reply #3 on: March 02, 2019, 12:47:28 AM »
Damn, that is a huge list with some big names in there too.  It reminds me of when I was looking at a shopping cart program that saved the CC info in plain text.  I searched for the default file name Altavista (yes it was a long time ago) and found hundreds of files with credit card numbers on them.

ergophobe

  • Inner Core
  • Hero Member
  • *
  • Posts: 9324
    • View Profile
Re: CSV: plaintext offenders
« Reply #4 on: March 02, 2019, 03:08:20 AM »
It's funny. You look at some code and you see they are still storing passwords as MD5 hashes and you think "Do they know nothing?"

And then you find out some people don't hash at all.