๐ Cryptographic Failure: Plaintext Password Storage
This demo shows a vulnerable API that stores user credentials without any encryption. This violates basic cryptographic security practices and is commonly exploited in data breaches.
๐งช How to Test Using Postman
- Open Postman or any API client.
- Send aย
POST
ย request to:ย/api/vuln-crypto
- In the Body tab, select raw โ JSON and send:
{ "username": "testuser", "password": "supersecret123" }
- Observe that the response includes your password in plaintext:
{ "status": "User stored (insecurely)", "storedUser": { "username": "testuser", "password": "supersecret123" } }
Waiting for test...
Best practice is to hash passwords using strong algorithms (e.g., bcrypt or Argon2).