Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Password Hash Instead of Password for Authentication

The software records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.