On Thu 15 Nov 2018 at 03:41:42 +1100, Andrew McGlashan wrote:

> 
> 
> On 15/11/18 2:51 am, Brian wrote:
> > And what is the value to an attacker in having /etc/shadow, assuming it
> > can be decrypted in a sensible time frame? Remotely logging in? Surely
> > not in these days of ssh keys?
> 
> Well.... re-use of passwords.
> 
> We all know that if you have a username (often times an email address)
> and the password used for that username, then there are too many places
> where that same credentials might be re-used elsewhere.

True, that is a possibility. But unless the attack is against a known
user whose habits are also known or that can be guessed, knowing the
password isn't dreadfully useful in itself.

-- 
Brian.

Reply via email to