Can I protect against password hacking just by salting the previous-hash

0 votes
I’ve seen some discussions where people suggest taking an existing password hash and salting it again instead of hashing the plain text password each time.

Would this method provide any real security benefits, or is it fundamentally flawed? Could attackers still brute-force the original hash, even if a second layer of hashing is added?
Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
32 views

1 answer to this question.

0 votes

Enhancing password security is crucial in safeguarding user data against unauthorized access. The method you've encountered—taking an existing password hash and salting it again, raises important considerations regarding its effectiveness.

Understanding the Proposed Method

The approach involves taking an already hashed password, adding a salt to it, and hashing it again. This process is sometimes referred to as double hashing. The intention behind this method is to add an extra layer of security by further obfuscating the original password.

Security Implications

While the idea of adding layers to password hashing might seem beneficial, this particular method has notable drawbacks:

  1. Limited Security Benefits: Hashing an already hashed password does not significantly increase security. The initial hash output has a fixed length and reduced entropy compared to the original password, which can limit the effectiveness of additional hashing.

  2. Potential for Hash Collisions: Hashing the hashed output can lead to hash collisions, where different inputs produce the same hash value. This can inadvertently reduce the uniqueness of hashed passwords, potentially compromising security.

  3. Vulnerability to Brute-Force Attacks: If an attacker gains access to the hashed passwords, they can still perform brute-force attacks to guess the original passwords. Double hashing does not inherently slow down this process or make it more computationally intensive for attackers.

Recommended Best Practices

Instead of relying on double hashing, consider implementing the following best practices to enhance password security:

  1. Use Strong, Unique Salts: Generate a unique, random salt for each password before hashing. This ensures that even if two users have the same password, their hashed values will differ, thwarting precomputed attacks like rainbow tables.

  2. Employ Key Stretching Algorithms: Utilize algorithms designed to be computationally intensive, such as bcrypt, Argon2, or PBKDF2. These algorithms apply multiple iterations of hashing, significantly increasing the time required for an attacker to crack passwords through brute-force methods.

  3. Implement Rate Limiting and Account Lockouts: Protect against online brute-force attacks by limiting the number of failed login attempts and temporarily locking accounts after successive failures. This makes automated guessing attacks more difficult to execute.

answered Feb 10 by CaLLmeDaDDY
• 16,200 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
0 answers

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
30 views
+3 votes
3 answers
0 votes
1 answer

Can I use Ryzen core laptops for hacking??

Hey, @Arun, I cannot assure you on Ryzen ...READ MORE

answered Sep 14, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,770 points

edited Oct 6, 2021 by Sarfaraz 1,042 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
337 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
388 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
240 views
+1 vote
1 answer
+1 vote
1 answer

What is the role of WHOIS data in DNS footprinting and how can I automate retrieval?

WHOIS data is essential in DNS footprinting ...READ MORE

answered Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
277 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP