Slide 26
Slide 26 text
9. Weak Encryption
9. Weak Encryption
While generating password reset tokens,
sometimes developers use weak encryption
algorithms. For example, sometimes they
just encrypt the user-id/username of user +
timestrap using some weak encryption
algorithms .