NShiftKey-Rule-Guide logo NShiftKey-Rule-Guide

1.Vulnerability Description

2. Vulnerability Countermeasure

3. Sample Code

public String getCryptedPassword(String salt, String password) {
    return new MD5HashGenerator().getValue(password);
}
public String getSalt(String userId, String password) {
    return SHA256HashGenerator.getInstance().getValue("--" + Calendar.getInstance().getTime().toString() + "--" + userId + "--");
}

public String getCryptedPassword(String salt, String password) {
    return SHA256HashGenerator.getInstance().getValue("nest--" + salt + "--" + password + "--");
}