All Collections
HackEDU Lesson Help
Secure Password Storage Help
Vulnerability Is Not Fixed (Secure Password Storage: Part 3 Lesson)
Vulnerability Is Not Fixed (Secure Password Storage: Part 3 Lesson)
Jared Bautista avatar
Written by Jared Bautista
Updated over a week ago


The password storage vulnerability is not fixed. Passwords are not being hashed by Argon2 correctly.

Test 1:

Ensure the Argon2 hashing function is being called correctly. See the Remediation step for specific code examples on how to call the function; ensure the arguments you are providing are the correct type. Verify that you are inserting the hash into the password column within the user table.

Test 2:

Register a new user and look at the User Registry tab. If you are calling the hashing function correctly, the password column should contain a hash that looks similar to this:


Ensure the different parts that make up the hash string are the expected values:

  • Variation should be argon2id

  • Memory cost should be 65536

  • Time cost should be 3

If any of these values do not match what you see in the password column, examine your register function for bugs.

Did this answer your question?