- MD5 (deprecated cryptographic hash functions)
- Loose comparison
That's all ?
Try with a default password:
$ src/cli.php --password p4ssW0rD
Your are not authorized.
Try with "240610708" as password
$ src/cli.php --password 240610708
-
Magic Hashes are strings which will be evaluated as float (exponational notation with
e
) -
Loose comparison is weird with float
- strict comparison (not enought, what about timming attack ?)
- use
password_hash()
,password_verify()
orhash_equals()
. these functions are constant time. This makes it safe against timing attacks. - Use modern hash function such as argon2, scrypt or bcrypt.