You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PT stores unencrypted text in memory. If a memory dump is automatically taken after a system or application crash or some of the memory is saved to a swap file, the sensitive information will be present on the disk. Sometimes it is possible to configure an operating system not to use a dump and swap files.
Known weaknesses and considerations.
Keywords; security, problems.
Some info in wiki:
Some info in #4
#25
PT stores unencrypted text in memory. If a memory dump is automatically taken after a system or application crash or some of the memory is saved to a swap file, the sensitive information will be present on the disk. Sometimes it is possible to configure an operating system not to use a dump and swap files.
PT stores unencrypted passwords in memory
vim script/plugin/auto command (as of
puren_tonbo/pt.vim
Line 26 in 494c535
Doc command line arg exposure.
Doc or link to each encryption implementation with quick overview and possible weaknesses (some notes in #4):
For shelling out, command with same name as real command at head is path could wrap real binary/script and log passwords and/or plain text.
https://www.reddit.com/r/crypto/comments/100b0ed/how_much_of_a_security_risk_is_it_to_expose_a/
WIP ptwebcp uses/allows GET parameters for password for convenience of debugging and testing. Leaks passwords to browser history.
The text was updated successfully, but these errors were encountered: