Bcrypt & Password Security - An Introduction

  Рет қаралды 98,737

Hack Reactor

Hack Reactor

Күн бұрын

Пікірлер: 275
@nyzss
@nyzss 3 жыл бұрын
nice video, and also hello fellow mangadex users.
@dikshagoyal5021
@dikshagoyal5021 3 жыл бұрын
Hello, mangadex user here.
@acubanwholosthiscar7693
@acubanwholosthiscar7693 3 жыл бұрын
Grating cheese fellow mangadex user
@lkafi
@lkafi 3 жыл бұрын
Hello frens
@daveseo2889
@daveseo2889 3 жыл бұрын
Greetings, fellow mangadex users.
@aliss_m
@aliss_m 3 жыл бұрын
Hello
@swarnavopurkayastha4489
@swarnavopurkayastha4489 3 жыл бұрын
Views are gonna go stonks, now that mangadex promoted it
@Spiceymomo
@Spiceymomo 3 жыл бұрын
same i came from there 😂
@DareV53
@DareV53 3 жыл бұрын
Stonks
@umaisali7094
@umaisali7094 3 жыл бұрын
I also came from there 😂😂
@shnoopachar9168
@shnoopachar9168 3 жыл бұрын
Pretty sure we all came here because we were bored
@idontwantbelieveiwantknow.3526
@idontwantbelieveiwantknow.3526 3 жыл бұрын
STONKS
@rierier1
@rierier1 3 жыл бұрын
Came because of mangadex, stayed because of the easy to understand explanations. I can foresee myself coming to this channel a lot 😲
@Ajay-ox1eo
@Ajay-ox1eo 3 жыл бұрын
It's dead tho.
@kandigloss6438
@kandigloss6438 3 жыл бұрын
It doesn't seem to be active tho and even when it was active it seemed to be a mix of conferences and someone's garbage bin, this seems like the most useful thing on it. Nice to have this though since clicking around all the other videos on this are needlessly complicated (one even turning "what is plain text?" into a drawn out and complicated explanation, wtf)
@aminakay8
@aminakay8 3 жыл бұрын
This was actually really interesting. Thanks mangadex 😂
@AndyThomasStaff
@AndyThomasStaff 9 ай бұрын
no one cares
@3411-r2e
@3411-r2e 3 жыл бұрын
whew, im safe. my password is way too weeb to be in any dictionary.
@senkuayano4937
@senkuayano4937 3 жыл бұрын
same
@markjohnston6974
@markjohnston6974 3 жыл бұрын
Joke's on you, the hackers are weebs, too.
@rickykurnia8940
@rickykurnia8940 3 жыл бұрын
meaning?
@oka1424
@oka1424 3 жыл бұрын
Mine's too personal so it might as well be random
@mqbaka
@mqbaka 3 жыл бұрын
problem is, if one of mangadex user uses a password that he has in his dictionnary, he would be able to find all the other passwords using their hash. He just has to find one match to get all the others (I guess, the video does'nt make that point very clear but, I assume that is the way it works)
@man_lady8510
@man_lady8510 3 жыл бұрын
i get none of this but i feel safer now thanks mangadex
@lyrisio
@lyrisio 3 жыл бұрын
From what I understand: "abc123" + "salt" => [bcrypt] => "ab7qru.." Salt can be any string of characters and is protection against dictionary attacks (hackers generate a dictionary of common passwords and test it against the database). Generally, salt is unique for each user taking account their join-date, their age, etc. If we take that into account, it can turn into: [salt] = [join date] + [age] ^ 2 [password-digest] = bcrypt([password] + [salt]) TLDR = It takes a long time to decrypt a single password from a single account.
@ashwanishahrawat4607
@ashwanishahrawat4607 3 жыл бұрын
Cartoon > Animation > Anime > OPM > Mangadex > Hack Reactor Great Journey so far, learned a lot.
@kennethjor
@kennethjor 10 жыл бұрын
Nice explanation of password hashing and salts, but I have to admit I came here looking for an explanation of bcrypt specifically.
@kurama4785
@kurama4785 3 жыл бұрын
Thanks for the video and i want to thank MangaDex team for introducing me to this channel
@PantsStatusZero
@PantsStatusZero 10 жыл бұрын
A dictionary attack is specifically a brute force attack using dictionary terms. A look up table of hashes is know as a rainbow table. Some rainbow tables are produced using a dictionary attack. A salt should be unique to each user. Salts make it hard to produce a rainbow tables because you would have to create a different rainbow table for every possible salt. So it's every possible password times every possible salt.
@van2297
@van2297 3 жыл бұрын
Mangadex users👀
@SirLightfire
@SirLightfire 3 жыл бұрын
Something he didn't mention is that you typically generate a salt _per password_. That means that generating the hash dictionary (or "rainbow table" as they're typically called) is impossible to generate in the first place. This means that cracking each password is _even slower_ because two users who have the same password, will have different password digests, because they have different salts
@daniel....
@daniel.... 8 жыл бұрын
Thanks for this video. I finally understood how bcrypt works, especially the part about salts. One of the main advantages of bcrypt is that it cannot go obsolete as computers become faster because you just have to increase the number of rounds of hashing. When first released in 1999, the recommended number of rounds was 2^6...not you should use 2^15 for increased security.
@IsaacFoster..
@IsaacFoster.. 3 жыл бұрын
I just wanted a site to read some manga , how did I get here lmao
@jaycela900
@jaycela900 3 жыл бұрын
I'm here bcoz of what happened to mangadex,..😭😭😭😭
@crixavey9385
@crixavey9385 4 жыл бұрын
The best explanation i have watch on Bcrypt functionality. Thanks
@yogeesh93
@yogeesh93 8 жыл бұрын
Please change the title to hashing and password security. "bcrypt" in title is misleading, I thought it explains about bcrypt working!
@Abdulaziz_turki
@Abdulaziz_turki 3 жыл бұрын
From mangadex✌🏻
@betr8
@betr8 3 жыл бұрын
Thank god I read JOJO with no email in mangadex. Nice video btw.
@fawazaljohani8447
@fawazaljohani8447 4 жыл бұрын
My 4 months security class in 7 minutes
@23o8idlnqdolkqd
@23o8idlnqdolkqd 2 жыл бұрын
A BCrypt hash includes salt and as a result this algorithm returns different hashes for the same input..
@idontwannagetbanned
@idontwannagetbanned 3 жыл бұрын
dont feel as scared about the mangadex leak now
@DZatheus
@DZatheus 3 жыл бұрын
Ok, so Mangadex is using an enigma machine. Got it.
@ahmadromdani5085
@ahmadromdani5085 3 жыл бұрын
haha
@anissefiani4453
@anissefiani4453 2 жыл бұрын
Subscribed. Very clear and simple explained!!!
@AndyThomasStaff
@AndyThomasStaff 9 ай бұрын
you were lied to. this video is garbage
@AbhiKhatri
@AbhiKhatri 9 жыл бұрын
Hats off to you man, I really liked your explanation. I am gonna share this to the dev community. :D
@logtguy8822
@logtguy8822 3 жыл бұрын
THANK GOD I USED A GOOGLE RECCOMENDED PASSWORD
@belajarit-65
@belajarit-65 Жыл бұрын
ohh, the reason is really-really great and so funny for me 😂😂
@AndyThomasStaff
@AndyThomasStaff 9 ай бұрын
don't share your worthless thoughts
@cleave4667
@cleave4667 3 жыл бұрын
this man must be confused with the mangadex comments
@Melonno
@Melonno 2 жыл бұрын
Thanks for a great explanation!
@jocasteins4309
@jocasteins4309 3 жыл бұрын
The Last video is 5 years ago quite sad but it is good to know this channel thanks to mangadex
@LBLE_
@LBLE_ 2 жыл бұрын
Nice explanation.
@Gheotic
@Gheotic 7 жыл бұрын
Awesome explanation, it all make sense for me now
@fatimaharrie6446
@fatimaharrie6446 3 жыл бұрын
i feel so smart now thank you
@fatimaharrie6446
@fatimaharrie6446 3 жыл бұрын
also stoked for the new mangadex!
@mohammedishaan2099
@mohammedishaan2099 6 жыл бұрын
Nice Explaination. Thank You.
@ondrejvainer1510
@ondrejvainer1510 3 жыл бұрын
Great video, thanks!
@CunningAndGuile
@CunningAndGuile 4 жыл бұрын
This answered my questions and then some, thank you!
@samandarshoyimov5580
@samandarshoyimov5580 4 ай бұрын
nice, very informative
@spookyy607
@spookyy607 3 жыл бұрын
Shit now i dont Remember what my password to mangadex was :/ Is three any way to show it now?
@jasongandy3996
@jasongandy3996 3 жыл бұрын
if your on chrome go to settings then passwords
@AJ-po6up
@AJ-po6up 3 жыл бұрын
it's 2021 use a password manager goddammit!
@somiya968
@somiya968 3 жыл бұрын
My overthinking saved me this time.
@yuunayunohana9920
@yuunayunohana9920 3 жыл бұрын
This video makes it seem like you use a single salt for all users, which you must not do! Instead you should give each user their own random salt and store it with the user in the database. That way an attacker has to create a separate dictionary for each user. Additionally, same hashed passwords are different for different user. So even if Alice and Bob use the same password, this is then not apparent in the database because the hash still differ.
@blogeek7039
@blogeek7039 7 жыл бұрын
The difference is... never use MD5 ;)
@FeliJz
@FeliJz 8 жыл бұрын
Awesome explanation!
@DialecticalMaterialismRocks
@DialecticalMaterialismRocks 3 жыл бұрын
exceeded my expectations
@limitless9483
@limitless9483 2 жыл бұрын
Very clear thanks
@deboramei6413
@deboramei6413 3 жыл бұрын
Estou saudade mangadex! 😢🤗❤
@goggles_2025
@goggles_2025 3 жыл бұрын
Slightly off topic but As a mangadex user, is there anything i should do??
@That_One_Guy...
@That_One_Guy... 3 жыл бұрын
Imagine suddenly getting views flood because manga website recommends your video :)))
@re-blitz
@re-blitz 3 жыл бұрын
They made a api but I can’t use it cause I can only read on mobile at the time and idk if the website is going up anytime soon :(
@tripsd5929
@tripsd5929 7 жыл бұрын
Storing Hash (password + static salt) = HASHnew (lets say) in database is a bad idea. If the database is compromised, the attacker can use that static hash value (i.e.HASHnew) and pass it through MiTM to get authenticated.
@Yo-yx8wo
@Yo-yx8wo 4 жыл бұрын
salt is not static but random
@kueapel911
@kueapel911 3 жыл бұрын
haha jokes on the mangadex hackers, my password was already leaked along with my username on compromised password list.
@AJ-po6up
@AJ-po6up 3 жыл бұрын
Exactly, mine has been leaked and in the wild since 2010, so it's old news! there's nothing of value behind that password.
@kueapel911
@kueapel911 3 жыл бұрын
@@AJ-po6up even if they try to use it on other website, the most they'd get out of it would be some edgy comment list I made years ago. Nothing of value was lost. That's why I always use my leaked password for non crucial websites lol.
@JonyElektro
@JonyElektro 3 жыл бұрын
Why didn't I know about this in my college days? Now I feel like an idiot using md5 to encrypt my projects...
@SirLightfire
@SirLightfire 3 жыл бұрын
Depending on how old you are, md5 would've been fine for the computing power of the day
@leana339
@leana339 3 жыл бұрын
Nice video good that i used a dumpster mail for mangadex but not so good that i don't have access to the dumpster mail anymore after their hack.
@paulinebunuan
@paulinebunuan 3 жыл бұрын
Where do you read your manga now?
@Xavslip
@Xavslip 3 жыл бұрын
Mangasee ig
@paulinebunuan
@paulinebunuan 3 жыл бұрын
I used to read from the scanlators' respective websites, but I recently found Manganeko.net and it has no ads so its pretty good.
@NoobWardenSpammer
@NoobWardenSpammer 3 жыл бұрын
Hello just a thought to my self, what will happen if we encrypt both email and password before storing it in the database?
@theswedishdude1
@theswedishdude1 3 жыл бұрын
so if you use an uncommon password then they wouldn't have it in their dictionary and you'd be safe?
@smokingrailgun4584
@smokingrailgun4584 3 жыл бұрын
No, it should be unique. Like a project/operation name, with numbers (birthday date, or other for you meaningful dates).
@ginicholas4322
@ginicholas4322 7 жыл бұрын
I'm pretty sure it's slow because it probably uses multiple Salts before and after the hash and is unique for every user other than that if one found out about the Salt well then wouldn't the entire Bcrypt database be comprised?
@UndeadFleshgod
@UndeadFleshgod 6 жыл бұрын
BCrypt uses a single per-user salt. You just hash it over and over again to slow the hashing process. The salt is actually embedded in the hash itself with the work factor (Format looks like $bcryptVersion$workFactor$saltHash) so you do have the salt for everyone. But that means you can't bruteforce all your database with that salt, only a single user.
@90OiNoTnA
@90OiNoTnA 3 жыл бұрын
So should I change the pwsord? So I enter the mangadex?
@vampante
@vampante 3 жыл бұрын
what do you mean?
@90OiNoTnA
@90OiNoTnA 3 жыл бұрын
@@vampante that is, I did not understand well.
@ChaceBonanno
@ChaceBonanno 3 жыл бұрын
So bcrypt uses a pepper to slow down the hashing process?
@JohnySilverhand
@JohnySilverhand 3 жыл бұрын
What is the difference between hashing algorithms and functions?
@draggador
@draggador 3 жыл бұрын
mangadex is way more responsible with their security than most corporations are
@xaviermerinogomez2398
@xaviermerinogomez2398 3 жыл бұрын
But if I didn't sign up to the website and the website got hacked then am I safe or not?
@cadeheinberg3047
@cadeheinberg3047 3 ай бұрын
How are you writing so good with a mouse. WTH
@dacree0216
@dacree0216 6 жыл бұрын
in 6:00, why hacker compromise the password will compromise the salt? And how can hacker compromise the password??
@CombatArmsPro100
@CombatArmsPro100 5 жыл бұрын
Brute force, rainbow, dictionary
@Nasa1423
@Nasa1423 3 жыл бұрын
I feel personally attacked... Thanks for the explanation tho.
@kazunyaaa
@kazunyaaa 3 жыл бұрын
turn on 2FA, it's a pain to use it every time but it works
@OneSaltyBruh
@OneSaltyBruh 3 жыл бұрын
yes hello from mangadex
@yam4040
@yam4040 3 жыл бұрын
It means that the mangadex uses good program to store our database
@sarfaraza2419
@sarfaraza2419 3 жыл бұрын
Does bcrypt uses salt to hash password ?
@Greenleaf_
@Greenleaf_ 3 жыл бұрын
Isn't that a rainbow table? I thought a dictionary attack was when you bruteforce using common words instead of individual characters.
@markmiller8080
@markmiller8080 9 жыл бұрын
This is an awesome explanation!
@riyan_prof
@riyan_prof 3 жыл бұрын
I think he will promote l@st pas😆 for storing password but I'm wrong when look at the videos upload times.... 😄 I'm glad...
@уват
@уват 11 ай бұрын
amazing!
@darrenjones1671
@darrenjones1671 6 жыл бұрын
So if your password isn't a horrible password in the list of the hackers' dictionary attack does the dictionary attack not work? The dictionary attack only works for passwords that they would test against?
@markjohnston6974
@markjohnston6974 3 жыл бұрын
Yes...ish. Their list of 'common passwords' likely approximates 'every leaked password ever'. It's just text, the space and power to store it and run through it is negligible. If your password is literally unique in the universe, then yes, a dictionary attack would not work against it. If your password is an 8-letter English word, it almost definitely is on the dictionary. So anyone thinking 'my password is secure because it's not on the Top 10 Most Used Passwords List' is kidding themselves.
@Jmaasy
@Jmaasy 10 жыл бұрын
Nice and clear explanation
@doosnobs8214
@doosnobs8214 3 жыл бұрын
I want to know how a website or app that has the hashed passwords let someone in. For example, the pw abc123 is hashed into jibberish, how does the database recognize the hash? I feel like I can guess that the pw you sign in with gets hashed the same way, so that when the hashed pw gets compared to the database one it lets you in. I would appreciate someone letting me know how it actually works.
@TheOcmer
@TheOcmer 3 жыл бұрын
That is basically it. When you log in the app will encrypt the entered password and compares it with the stored password hash. If they match, the user entered the correct password. In the case the salt gets somehow changed, users will not be able to log in anymore as it will produce different hashes as the stored password hashes did not change.
@ahmadalmoustafa
@ahmadalmoustafa 8 жыл бұрын
Thanks , great explanation
@Anvilshock
@Anvilshock 3 жыл бұрын
Okay, so it's "designed" to be slow, but how does one do that? Surely it's not as easy as inserting a ton of WAIT clauses or somesuch that someone else compiling the algorithm for themselves could just take out and/or something easily alleviated by throwing ever more computation power at it thanks to Moore's, right?
@jellyrabbits375
@jellyrabbits375 3 жыл бұрын
The hashing algorithm takes computational work, which takes time. It's designed to be slow by just doing more and more computational work, the attacker knows the exact computations he needs to do to get the same hash, but he needs to do it on every password he tries to guess. So if the computation takes 10 seconds, then each guess of his will cost him 10 seconds which he will have to go through for each of his guesses.
@Anvilshock
@Anvilshock 3 жыл бұрын
@@jellyrabbits375 Appreciate the response, but it didn't actually explain anything. Just said the same things with different words.
@zenky4989
@zenky4989 3 жыл бұрын
lets be real we are all bob (im coming from mangadex btw)
@SystemBot
@SystemBot 3 жыл бұрын
what if you hash the hash and the salt?
@megumugi8620
@megumugi8620 3 жыл бұрын
So, This means that i dont have to be too scared about my password on mangadex?
@kanoccino
@kanoccino 3 жыл бұрын
A simple password change should be safe, unless you use the same password in other websites, i suggest you change them all if ever the breacher decides to expose the info.
@lyrisio
@lyrisio 3 жыл бұрын
@@kanoccino or 2FA; if the website does not have that then just do what Kael H is saying.
@letsgodevs
@letsgodevs 3 жыл бұрын
Thank you sir
@IsaacFoster..
@IsaacFoster.. 3 жыл бұрын
My name isn't bob. I am bob.
@senkuayano4937
@senkuayano4937 3 жыл бұрын
i came here from mangadex
@JonWoo
@JonWoo 6 жыл бұрын
Very nice.
@GabeFromUtah
@GabeFromUtah 8 жыл бұрын
Very impressed with this presentation. You are quick with the tablet?
@martacronk6563
@martacronk6563 Жыл бұрын
I WANT THIS OFF OF MY KZbin. It won't let me delete it!!!!
@Sohendar
@Sohendar 3 жыл бұрын
but, why is it slow? what makes it slow? and how by being slow makes it good?
@VinTJ
@VinTJ 3 жыл бұрын
I think he means the hashes are more complex and longer, therefore slower to generate. imagine if md5 takes the original string and turns it into a hash after 10 steps. Bcrypt turns it into a hash after like 50 steps. therefore for a list of the Dictionary Hash (assuming the hacker tries to make one that has a list of top 10,000 common passwords for example) it becomes like 50,000 times LONGER to generate the whole dictionary hash. imagine if the md5 dictionary hash it takes 1 minute to create and for bcrypt dictionary hash takes 50,000 minutes or a whole month. That's an insane difference. take this with a grain of salt ( _haha_ ) since I'm not a code-person but I think that's pretty much it
@oceanmeme5475
@oceanmeme5475 3 жыл бұрын
i just wanted to read part 7
@vampante
@vampante 3 жыл бұрын
I was panicking because i thought I couldn't read the new part 8 chapter
@dzah04
@dzah04 3 жыл бұрын
thank god i read it on mangadex a year ago
@tl1326
@tl1326 3 жыл бұрын
im sad to say i am a bob but im also happy to say that now i am an alice
@martinmohammed4087
@martinmohammed4087 2 жыл бұрын
How can the hacker take the salt from an hash? That should be not possible? At 6:00 in video...
@FalcoGer
@FalcoGer 5 жыл бұрын
this is in fact not how bcrypt works. it works as a general idea on securing passwords, bcrypt uses a chained key generator accessing pseudorandom memory addresses to set up for generating the hash. the salt is not appended or prepended to the password string but instead used to set up the key generation.
@VinTJ
@VinTJ 3 жыл бұрын
so the part he got wrong is just how the salt works then?
@stray5188
@stray5188 3 жыл бұрын
Video: but bob is not so smart Me: oh that's me
@Syxtori
@Syxtori 3 жыл бұрын
Is my Crunchyroll safe😭😭
@IYIrOWN
@IYIrOWN 3 жыл бұрын
Basically this video has a wrong title, because you don't explain any factors as to why bcrypt is slow, so any algorithm could have been used and therefore this video shoulda been called: how hashing passwords work integrated with salt (loosely explained). - I came here to find info on bcrypt, and there was none cept "it's slow".
@lahirupc
@lahirupc 5 жыл бұрын
Why BCrypt is better 6:02
@dcg819
@dcg819 3 жыл бұрын
I am Bob.
@xiaoyangmu6439
@xiaoyangmu6439 7 жыл бұрын
Awesome !
@EVVENN
@EVVENN 3 жыл бұрын
I did not plan to do this but my mangadex gmail acc is the same as my facebook gmail lol and someone tried to change my password, jokes on you hacker, for every site I use a different password even I forget about them
@VinTJ
@VinTJ 3 жыл бұрын
lmao tbh relate, I've lost like 30% of accounts I've made as a kid on kiddie flash game websites
@rellatheday6156
@rellatheday6156 3 жыл бұрын
Yahhhhhhhhhhh so I'm ah go and start to change all my password
@moaazbhnas886
@moaazbhnas886 8 жыл бұрын
thanks a lot ❤️❤️
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 135 М.
OAuth 2.0: An Overview
6:34
InterSystems Learning Services
Рет қаралды 1,2 МЛН
Миллионер | 3 - серия
36:09
Million Show
Рет қаралды 1,7 МЛН
Random Emoji Beatbox Challenge #beatbox #tiktok
00:47
BeatboxJCOP
Рет қаралды 67 МЛН
Can You Find Hulk's True Love? Real vs Fake Girlfriend Challenge | Roblox 3D
00:24
Car Bubble vs Lamborghini
00:33
Stokes Twins
Рет қаралды 45 МЛН
Password Storage Tier List: encryption, hashing, salting, bcrypt, and beyond
10:16
But what is a neural network? | Deep learning chapter 1
18:40
3Blue1Brown
Рет қаралды 17 МЛН
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 355 М.
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,5 МЛН
What is JWT? JSON Web Tokens Explained (Java Brains)
14:53
Java Brains
Рет қаралды 1 МЛН
Why is JWT popular?
5:14
ByteByteGo
Рет қаралды 335 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
AES: How to Design Secure Encryption
15:37
Spanning Tree
Рет қаралды 170 М.
Hashing Passwords in Node and Express using bcrypt
17:38
Sam Meech-Ward
Рет қаралды 31 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 280 М.
Миллионер | 3 - серия
36:09
Million Show
Рет қаралды 1,7 МЛН