Aquire password database (it’s properly hashed and salted)
Create an account and access the password reset form
Dig into the front-end code to find whatever is doing the hash calculations
Brute-force a list of common passwords and look for matches
It would still take significant time, but it’s still a vulnerability, especially as technology evolves. You’re right that best practices are different for a reset form, but there are some things that are common (like don’t do hashes in the front end).
It would still take significant time, but it’s still a vulnerability, especially as technology evolves. You’re right that best practices are different for a reset form, but there are some things that are common (like don’t do hashes in the front end).