Bcrypt & Password Security - An Introduction

Поделиться
HTML-код
  • Опубликовано: 29 сен 2024

Комментарии • 275

  • @nyzss
    @nyzss 3 года назад +1267

    nice video, and also hello fellow mangadex users.

  • @DialecticalMaterialismRocks
    @DialecticalMaterialismRocks 3 года назад

    exceeded my expectations

  • @LBLE_
    @LBLE_ 2 года назад

    Nice explanation.

  • @limitless9483
    @limitless9483 2 года назад

    Very clear thanks

  • @Melonno
    @Melonno 2 года назад

    Thanks for a great explanation!

  • @samandarshoyimov5580
    @samandarshoyimov5580 2 месяца назад

    nice, very informative

  • @SystemBot
    @SystemBot 3 года назад

    what if you hash the hash and the salt?

  • @tripsd5929
    @tripsd5929 7 лет назад +2

    Storing Hash (password + static salt) = HASHnew (lets say) in database is a bad idea. If the database is compromised, the attacker can use that static hash value (i.e.HASHnew) and pass it through MiTM to get authenticated.

    • @Yo-yx8wo
      @Yo-yx8wo 4 года назад

      salt is not static but random

  • @blogeek7039
    @blogeek7039 7 лет назад +4

    The difference is... never use MD5 ;)

  • @That_One_Guy...
    @That_One_Guy... 3 года назад +1

    Imagine suddenly getting views flood because manga website recommends your video :)))

  • @rnaodmsomething
    @rnaodmsomething 3 года назад

    stonks

  • @moaazbhnas886
    @moaazbhnas886 7 лет назад

    thanks a lot ❤️❤️

  • @ehclipse8764
    @ehclipse8764 3 года назад

    Hello Mangadex people

  • @shekargoudarukala3515
    @shekargoudarukala3515 6 лет назад

    The title is misleading. It explains nothing about working of bcrypt.

  • @HighOctaneNews570
    @HighOctaneNews570 Год назад

    I'm bob :c

  • @YoEnigma
    @YoEnigma 3 года назад

    What about bcrypt? Change title it’s misleading

  • @swarnavopurkayastha4489
    @swarnavopurkayastha4489 3 года назад +586

    Views are gonna go stonks, now that mangadex promoted it

  • @3411-r2e
    @3411-r2e 3 года назад +301

    whew, im safe. my password is way too weeb to be in any dictionary.

    • @senkuayano4937
      @senkuayano4937 3 года назад

      same

    • @markjohnston6974
      @markjohnston6974 3 года назад +75

      Joke's on you, the hackers are weebs, too.

    • @rickykurnia8940
      @rickykurnia8940 3 года назад

      meaning?

    • @oka1424
      @oka1424 3 года назад

      Mine's too personal so it might as well be random

    • @mqbaka
      @mqbaka 3 года назад +5

      problem is, if one of mangadex user uses a password that he has in his dictionnary, he would be able to find all the other passwords using their hash. He just has to find one match to get all the others (I guess, the video does'nt make that point very clear but, I assume that is the way it works)

  • @aminakay8
    @aminakay8 3 года назад +113

    This was actually really interesting. Thanks mangadex 😂

  • @rierier1
    @rierier1 3 года назад +142

    Came because of mangadex, stayed because of the easy to understand explanations. I can foresee myself coming to this channel a lot 😲

    • @Ajay-ox1eo
      @Ajay-ox1eo 3 года назад +2

      It's dead tho.

    • @kandigloss6438
      @kandigloss6438 3 года назад +2

      It doesn't seem to be active tho and even when it was active it seemed to be a mix of conferences and someone's garbage bin, this seems like the most useful thing on it. Nice to have this though since clicking around all the other videos on this are needlessly complicated (one even turning "what is plain text?" into a drawn out and complicated explanation, wtf)

  • @van2297
    @van2297 3 года назад +39

    Mangadex users👀

  • @IsaacFoster..
    @IsaacFoster.. 3 года назад +18

    I just wanted a site to read some manga , how did I get here lmao

  • @man_lady8510
    @man_lady8510 3 года назад +34

    i get none of this but i feel safer now thanks mangadex

    • @lyrisio
      @lyrisio 3 года назад

      From what I understand:
      "abc123" + "salt" => [bcrypt] => "ab7qru.."
      Salt can be any string of characters and is protection against dictionary attacks (hackers generate a dictionary of common passwords and test it against the database). Generally, salt is unique for each user taking account their join-date, their age, etc. If we take that into account, it can turn into:
      [salt] = [join date] + [age] ^ 2
      [password-digest] = bcrypt([password] + [salt])
      TLDR = It takes a long time to decrypt a single password from a single account.

  • @kueapel911
    @kueapel911 3 года назад +8

    haha jokes on the mangadex hackers, my password was already leaked along with my username on compromised password list.

    • @AJ-po6up
      @AJ-po6up 3 года назад +1

      Exactly, mine has been leaked and in the wild since 2010, so it's old news! there's nothing of value behind that password.

    • @kueapel911
      @kueapel911 3 года назад

      @@AJ-po6up even if they try to use it on other website, the most they'd get out of it would be some edgy comment list I made years ago. Nothing of value was lost. That's why I always use my leaked password for non crucial websites lol.

  • @kennethjor
    @kennethjor 10 лет назад +63

    Nice explanation of password hashing and salts, but I have to admit I came here looking for an explanation of bcrypt specifically.

  • @PantsStatusZero
    @PantsStatusZero 10 лет назад +32

    A dictionary attack is specifically a brute force attack using dictionary terms. A look up table of hashes is know as a rainbow table. Some rainbow tables are produced using a dictionary attack. A salt should be unique to each user. Salts make it hard to produce a rainbow tables because you would have to create a different rainbow table for every possible salt. So it's every possible password times every possible salt.

  • @jaycela900
    @jaycela900 3 года назад +13

    I'm here bcoz of what happened to mangadex,..😭😭😭😭

  • @cleave4667
    @cleave4667 3 года назад +7

    this man must be confused with the mangadex comments

  • @SirLightfire
    @SirLightfire 3 года назад +6

    Something he didn't mention is that you typically generate a salt _per password_. That means that generating the hash dictionary (or "rainbow table" as they're typically called) is impossible to generate in the first place.
    This means that cracking each password is _even slower_ because two users who have the same password, will have different password digests, because they have different salts

  • @kurama4785
    @kurama4785 3 года назад +5

    Thanks for the video and i want to thank MangaDex team for introducing me to this channel

  • @yuunayunohana9920
    @yuunayunohana9920 3 года назад +3

    This video makes it seem like you use a single salt for all users, which you must not do! Instead you should give each user their own random salt and store it with the user in the database.
    That way an attacker has to create a separate dictionary for each user. Additionally, same hashed passwords are different for different user. So even if Alice and Bob use the same password, this is then not apparent in the database because the hash still differ.

  • @yogeesh93
    @yogeesh93 8 лет назад +97

    Please change the title to hashing and password security. "bcrypt" in title is misleading, I thought it explains about bcrypt working!

  • @DZatheus
    @DZatheus 3 года назад +7

    Ok, so Mangadex is using an enigma machine. Got it.

  • @Abdulaziz_turki
    @Abdulaziz_turki 3 года назад +9

    From mangadex✌🏻

  • @23o8idlnqdolkqd
    @23o8idlnqdolkqd 2 года назад +2

    A BCrypt hash includes salt and as a result this algorithm returns different hashes for the same input..

  • @spookyy607
    @spookyy607 3 года назад +4

    Shit now i dont Remember what my password to mangadex was :/ Is three any way to show it now?

    • @jasongandy3996
      @jasongandy3996 3 года назад +1

      if your on chrome go to settings then passwords

    • @AJ-po6up
      @AJ-po6up 3 года назад +3

      it's 2021 use a password manager goddammit!

  • @idontwannagetbanned
    @idontwannagetbanned 3 года назад +5

    dont feel as scared about the mangadex leak now

  • @daniel....
    @daniel.... 8 лет назад +6

    Thanks for this video. I finally understood how bcrypt works, especially the part about salts. One of the main advantages of bcrypt is that it cannot go obsolete as computers become faster because you just have to increase the number of rounds of hashing.
    When first released in 1999, the recommended number of rounds was 2^6...not you should use 2^15 for increased security.

  • @bah-fv2ec
    @bah-fv2ec 3 года назад +3

    haha i don’t know my password so they can’t get my account haha take that hackers now let me read jojo

    • @idontwantbelieveiwantknow.3526
      @idontwantbelieveiwantknow.3526 3 года назад

      Moi j'ai un mot de passe diffèrent pour chaque site avec une adresse email fausse et un nom original/20

    • @vampante
      @vampante 3 года назад

      i was panicking because i thought i wasn't going to be able to read the new part 8 chapter

  • @betr8
    @betr8 3 года назад +1

    Thank god I read JOJO with no email in mangadex. Nice video btw.

  • @ashwanishahrawat4607
    @ashwanishahrawat4607 3 года назад +2

    Cartoon > Animation > Anime > OPM > Mangadex > Hack Reactor
    Great Journey so far, learned a lot.

  • @fawazaljohani8447
    @fawazaljohani8447 4 года назад +3

    My 4 months security class in 7 minutes

  • @Nasa1423
    @Nasa1423 3 года назад +2

    I feel personally attacked... Thanks for the explanation tho.

  • @theswedishdude1
    @theswedishdude1 3 года назад +3

    so if you use an uncommon password then they wouldn't have it in their dictionary and you'd be safe?

    • @smokingrailgun4584
      @smokingrailgun4584 3 года назад

      No, it should be unique. Like a project/operation name, with numbers (birthday date, or other for you meaningful dates).

  • @logtguy8822
    @logtguy8822 3 года назад +1

    THANK GOD I USED A GOOGLE RECCOMENDED PASSWORD

  • @Syxtori
    @Syxtori 3 года назад +1

    Is my Crunchyroll safe😭😭

  • @belajarit-65
    @belajarit-65 Год назад +1

    ohh, the reason is really-really great and so funny for me 😂😂

    • @AndyThomasStaff
      @AndyThomasStaff 7 месяцев назад +1

      don't share your worthless thoughts

  • @Dominus_Potatus
    @Dominus_Potatus 3 года назад +1

    5:18 so... basicly it is like elimination in algebra, hahaha

  • @oceanmeme5475
    @oceanmeme5475 3 года назад +3

    i just wanted to read part 7

    • @vampante
      @vampante 3 года назад

      I was panicking because i thought I couldn't read the new part 8 chapter

    • @dzah04
      @dzah04 3 года назад

      thank god i read it on mangadex a year ago

  • @IsaacFoster..
    @IsaacFoster.. 3 года назад +1

    My name isn't bob.
    I am bob.

  • @IYIrOWN
    @IYIrOWN 3 года назад

    Basically this video has a wrong title, because you don't explain any factors as to why bcrypt is slow, so any algorithm could have been used and therefore this video shoulda been called: how hashing passwords work integrated with salt (loosely explained). - I came here to find info on bcrypt, and there was none cept "it's slow".

  • @Greenleaf_
    @Greenleaf_ 3 года назад +1

    Isn't that a rainbow table? I thought a dictionary attack was when you bruteforce using common words instead of individual characters.

  • @re-blitz
    @re-blitz 3 года назад

    They made a api but I can’t use it cause I can only read on mobile at the time and idk if the website is going up anytime soon :(

  • @dacree0216
    @dacree0216 6 лет назад +2

    in 6:00, why hacker compromise the password will compromise the salt? And how can hacker compromise the password??

  • @bankaijutsu17
    @bankaijutsu17 3 года назад +1

    Hey its sketchbook

  • @crixavey9385
    @crixavey9385 4 года назад +2

    The best explanation i have watch on Bcrypt functionality. Thanks

  • @attainascend
    @attainascend 3 года назад

    the hackers really fucked up my fav manga website.
    This is a new low hackers. A new low, why can't you hack some real life things like billboards.
    And I finally found another website to read manga on. :(

    • @AJ-po6up
      @AJ-po6up 3 года назад

      ............which is??? (what's the name of the site)

  • @martinmohammed4087
    @martinmohammed4087 2 года назад

    How can the hacker take the salt from an hash? That should be not possible? At 6:00 in video...

  • @goggles_2025
    @goggles_2025 3 года назад

    Slightly off topic but
    As a mangadex user, is there anything i should do??

  • @JonyElektro
    @JonyElektro 3 года назад +1

    Why didn't I know about this in my college days?
    Now I feel like an idiot using md5 to encrypt my projects...

    • @SirLightfire
      @SirLightfire 3 года назад +1

      Depending on how old you are, md5 would've been fine for the computing power of the day

  • @keysl
    @keysl 3 года назад

    Hack Reactor must be a bit confused with sudden views increase.

  • @martacronk6563
    @martacronk6563 Год назад

    I WANT THIS OFF OF MY RUclips. It won't let me delete it!!!!

  • @PurG.
    @PurG. 3 года назад

    what are you a smart user or not so smart user?
    im a not so smart user, rip mangadex account, rip life

  • @xaviermerinogomez2398
    @xaviermerinogomez2398 3 года назад

    But if I didn't sign up to the website and the website got hacked then am I safe or not?

  • @draggador
    @draggador 3 года назад

    mangadex is way more responsible with their security than most corporations are

  • @kamikazek598
    @kamikazek598 3 года назад

    welp... gotta change my password with associated accounts now... sigh..

  • @EVVENN
    @EVVENN 3 года назад

    I did not plan to do this but my mangadex gmail acc is the same as my facebook gmail lol and someone tried to change my password, jokes on you hacker, for every site I use a different password even I forget about them

    • @VinTJ
      @VinTJ 3 года назад +1

      lmao tbh relate, I've lost like 30% of accounts I've made as a kid on kiddie flash game websites

  • @AJ-po6up
    @AJ-po6up 3 года назад

    Where is my MANGA AAAAAAAAAAAAAAAAAAAAAAAAAAAHHHHHHHHHHHHH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @cadeheinberg3047
    @cadeheinberg3047 Месяц назад

    How are you writing so good with a mouse. WTH

  • @暧昧-u8e
    @暧昧-u8e 3 года назад +1

    Poor Mangadex :(

  • @paulinebunuan
    @paulinebunuan 3 года назад +2

    Where do you read your manga now?

    • @Xavslip
      @Xavslip 3 года назад +1

      Mangasee ig

    • @paulinebunuan
      @paulinebunuan 3 года назад

      I used to read from the scanlators' respective websites, but I recently found Manganeko.net and it has no ads so its pretty good.

  • @ilus9051
    @ilus9051 3 года назад

    Do hackers use Chinese words. To know the password? With my ex girlfriend number?

    • @AJ-po6up
      @AJ-po6up 3 года назад

      yes they know Chinese and they also know your ex girlfriend, I'm sorry but you're fooked.

  • @senkuayano4937
    @senkuayano4937 3 года назад +2

    i came here from mangadex

  • @zenky4989
    @zenky4989 3 года назад

    lets be real we are all bob (im coming from mangadex btw)

  • @tl1326
    @tl1326 3 года назад

    im sad to say
    i am a bob
    but im also happy to say that now i am an alice

  • @rellatheday6156
    @rellatheday6156 3 года назад

    Yahhhhhhhhhhh so I'm ah go and start to change all my password

  • @ginicholas4322
    @ginicholas4322 7 лет назад +1

    I'm pretty sure it's slow because it probably uses multiple Salts before and after the hash and is unique for every user other than that if one found out about the Salt well then wouldn't the entire Bcrypt database be comprised?

    • @UndeadFleshgod
      @UndeadFleshgod 6 лет назад

      BCrypt uses a single per-user salt. You just hash it over and over again to slow the hashing process. The salt is actually embedded in the hash itself with the work factor (Format looks like $bcryptVersion$workFactor$saltHash) so you do have the salt for everyone. But that means you can't bruteforce all your database with that salt, only a single user.

  • @mohammedishaan2099
    @mohammedishaan2099 5 лет назад +2

    Nice Explaination. Thank You.

  • @Anvilshock
    @Anvilshock 3 года назад

    Okay, so it's "designed" to be slow, but how does one do that? Surely it's not as easy as inserting a ton of WAIT clauses or somesuch that someone else compiling the algorithm for themselves could just take out and/or something easily alleviated by throwing ever more computation power at it thanks to Moore's, right?

    • @jellyrabbits375
      @jellyrabbits375 3 года назад

      The hashing algorithm takes computational work, which takes time. It's designed to be slow by just doing more and more computational work, the attacker knows the exact computations he needs to do to get the same hash, but he needs to do it on every password he tries to guess.
      So if the computation takes 10 seconds, then each guess of his will cost him 10 seconds which he will have to go through for each of his guesses.

    • @Anvilshock
      @Anvilshock 3 года назад

      @@jellyrabbits375 Appreciate the response, but it didn't actually explain anything. Just said the same things with different words.

  • @stray5188
    @stray5188 3 года назад

    Video: but bob is not so smart
    Me: oh that's me

  • @somiya968
    @somiya968 3 года назад

    My overthinking saved me this time.

  • @sarfaraza2419
    @sarfaraza2419 3 года назад

    Does bcrypt uses salt to hash password ?

  • @godblessbharat708
    @godblessbharat708 3 года назад

    Mangadex view wave

  • @lahirupc
    @lahirupc 4 года назад +1

    Why BCrypt is better 6:02

  • @kaiclover3531
    @kaiclover3531 3 года назад

    so we all came from mangadex huh

  • @riyan_prof
    @riyan_prof 3 года назад

    I think he will promote l@st pas😆 for storing password but I'm wrong when look at the videos upload times.... 😄
    I'm glad...

  • @ondrejvainer1510
    @ondrejvainer1510 3 года назад

    Great video, thanks!

  • @ohexra
    @ohexra 3 года назад

    hello fellow mangadex people...

  • @aoisora4116
    @aoisora4116 3 года назад +1

    But really, mangadex. This is the first time that I signed up to a website and got hacked where our PWs and IPs were leaked. How careless of them.

  • @mIsPtr
    @mIsPtr 3 года назад

    70k

  • @leana339
    @leana339 3 года назад

    Nice video good that i used a dumpster mail for mangadex but not so good that i don't have access to the dumpster mail anymore after their hack.

  • @YaBi_VA
    @YaBi_VA 3 года назад

    thot This was another rick roll (hello there fellow mangadex user)

  • @moisesvelez1147
    @moisesvelez1147 4 года назад +1

    This answered my questions and then some, thank you!

  • @bonk827
    @bonk827 3 года назад

    I want mangadex back

  • @NoobWardenSpammer
    @NoobWardenSpammer 3 года назад

    Hello just a thought to my self, what will happen if we encrypt both email and password before storing it in the database?

  • @slimemm2502
    @slimemm2502 5 лет назад

    I came to know about algorithm of bycrypt hash but I didn't found anything that helps me you only told what every hashing algorithms do I know more on that this is not bcrypt

  • @OneSaltyBruh
    @OneSaltyBruh 3 года назад +1

    yes hello from mangadex

  • @bunnny1
    @bunnny1 3 года назад

    i got pwned D:

  • @FeliJz
    @FeliJz 8 лет назад +2

    Awesome explanation!

  • @stepskop8670
    @stepskop8670 5 месяцев назад

    lie