Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to decript password?????? #149

Open
IoTManagerProject opened this issue Sep 21, 2023 · 5 comments
Open

How to decript password?????? #149

IoTManagerProject opened this issue Sep 21, 2023 · 5 comments

Comments

@IoTManagerProject
Copy link

I use your package. I want to make password recovery system. All passwords now encripted by:

const hashPassword = bcrypt.hashSync(password, 7);

I need to decode password and get it. I able only compare bcrypt.compareSync. But i need GET IT?

Are you have way to get it??????????????????????????????????????

@dcodeIO
Copy link
Owner

dcodeIO commented Sep 21, 2023

The password becomes hashed and is no longer available in plain text.

@CorentinDeBoisset
Copy link

It is absolutely impossible to recover the password from the hash and that's the whole point of storing hashes : you can know if a given string is the right password by hashing it and comparing the result, but that's it.

The usual workflow when a password is lost is that the use will click on "forgotten password". Then, an email is sent to the address they have registerd when creating the account, and the user can reset their password.

@aflatoon2874
Copy link

Is the library still valid for current use? No activity for last seven years.

@ItaloRAmaral
Copy link

@aflatoon2874 yes!

@alexchu-dev
Copy link

The concept of hashing a password is of computer science, we hash it to encrypt the password and by "hashing", you can only compare the result if it matches. There is no easy way for you to "undo" the hash, and therefore we are still using this bcrypt after 7 years of non-maintained status. If we can simply unhash it, this is going to be a totally untrusted internet with credential and password leak everywhere in the world.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants