Critical Thinking - Bug Bounty Podcast cover image

Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling

Critical Thinking - Bug Bounty Podcast

CHAPTER

Vulnerabilities in Bcrypt and Mobile Security

This chapter explores a critical vulnerability in bcrypt related to username input truncation, impacting multi-factor authentication security. It discusses the transition from bcrypt to PBKDF2 as a response to identified flaws and reflects on historical security issues. Additionally, the chapter highlights mobile security vulnerabilities, particularly regarding intent URLs and inter-app communication risks, emphasizing the ongoing challenges of threat modeling in mobile environments.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner