Cryptographic Failures
Any misuse or lack of cryptographic security. The most common examples are weak password hashing, the use of HTTP instead of HTTPS, and vulnerable JavaScript web tokens.
We can find a typical example of this vulnerability as follows:
Assume we have obtained a password hash. First, we save it on a file
Then, we can use hashcat to break this hashed password
If successful, this will crack the hash and give us the corresponding password in the form of
$hash:$password
Last updated
Was this helpful?