- MD5 (deprecated cryptographic hash functions)
- Loose comparison
That's all ?
Try with a default password:
$ src/cli.php --password p4ssW0rDYour are not authorized.
Try with "240610708" as password
$ src/cli.php --password 240610708-
Magic Hashes are strings which will be evaluated as float (exponational notation with
e) -
Loose comparison is weird with float
- strict comparison (not enought, what about timming attack ?)
- use
password_hash(),password_verify()orhash_equals(). these functions are constant time. This makes it safe against timing attacks. - Use modern hash function such as argon2, scrypt or bcrypt.