Episode 10 — Secure Password Storage Properly: Hashing, Salting, and Safe Verification Logic

This episode breaks down password storage as a design problem that directly impacts breach impact, and it aligns to GSEC’s expectation that you understand hashing, salting, and verification at a conceptual level. You’ll explain why passwords must not be encrypted for routine verification, why hashes should be one-way with deliberate cost, and how salts prevent attackers from using precomputed tables or cross-user matching. We’ll walk through the safe verification flow, including how to compare derived values without leaking timing signals, and why password reset and recovery processes can become the real weakest link even when hashing is correct. Real-world examples include credential stuffing after database leaks, offline cracking based on weak hashing choices, and troubleshooting patterns like misconfigured identity stores or legacy apps that store reversible passwords. You’ll learn how exam questions often hide the core issue inside a broader scenario so you can spot the storage risk quickly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 10 — Secure Password Storage Properly: Hashing, Salting, and Safe Verification Logic
Broadcast by