<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Maik</title>
    <description>The latest articles on DEV Community by Maik (@c4s4r).</description>
    <link>https://dev.to/c4s4r</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F606950%2F6b9140aa-8229-4899-8fbb-ccf8906e0ec0.jpeg</url>
      <title>DEV Community: Maik</title>
      <link>https://dev.to/c4s4r</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/c4s4r"/>
    <language>en</language>
    <item>
      <title>The vulnerability of insecurely deleting password manager exports</title>
      <dc:creator>Maik</dc:creator>
      <pubDate>Tue, 20 Apr 2021 22:05:43 +0000</pubDate>
      <link>https://dev.to/c4s4r/the-vulnerability-of-insecurely-deleting-password-manager-exports-13a3</link>
      <guid>https://dev.to/c4s4r/the-vulnerability-of-insecurely-deleting-password-manager-exports-13a3</guid>
      <description>&lt;p&gt;In the past couple of weeks I've read many posts about moving from &lt;em&gt;Lastpass&lt;/em&gt; to &lt;em&gt;Bitwarden&lt;/em&gt; or another service. As a developer and IT-security student I'm always thinking carefully about the tools I use everyday.&lt;/p&gt;

&lt;p&gt;Don't get me wrong - password managers are the way to go if you want to contain the consequences regarding a data leak on a site you're registered. But when doing something like the migration of your passwords to a new service, you can easily find yourself creating a new attack vector for people or bots that try to steal your identity.&lt;/p&gt;

&lt;p&gt;When you export your &lt;code&gt;passwords.csv&lt;/code&gt; file from &lt;em&gt;Lastpass&lt;/em&gt;, for example, you should not forget about it or just delete it after the migration process is finished.&lt;/p&gt;

&lt;h2&gt;
  
  
  🗑 Why deleting or using &lt;code&gt;rm passwords.csv&lt;/code&gt; isn't enough
&lt;/h2&gt;

&lt;p&gt;When deleting a file, it will usually be moved to the trash bin by your operating system, unless configured differently. It should hopefully not be necessary to point out, that anyone can still access the file.&lt;/p&gt;

&lt;p&gt;The next thought would be to use something like &lt;code&gt;rm -rf passwords.csv&lt;/code&gt; to bypass the trash bin. Yes, you've apparently deleted the file. But what has truly happened in the background is a simple process of telling the disk that this specific data block is free (to use).&lt;br&gt;
&lt;strong&gt;The data selected when using the normal &lt;em&gt;delete&lt;/em&gt; operation or executing the &lt;code&gt;rm&lt;/code&gt; function is still physically there!&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ARnfAcF2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.dribbble.com/users/2071065/screenshots/7091033/media/3e54730e79d826680ef0544f882e6ebc.png%3Fcompress%3D1%26resize%3D400x350" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ARnfAcF2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.dribbble.com/users/2071065/screenshots/7091033/media/3e54730e79d826680ef0544f882e6ebc.png%3Fcompress%3D1%26resize%3D400x350" alt="Security vulnerability"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  🧲How to safely delete your export file
&lt;/h2&gt;

&lt;p&gt;After you have completed the migration of your passwords, you should "delete" the file safely, as otherwise all you passwords will still be stored on your computer in plaintext.&lt;/p&gt;

&lt;p&gt;If you're not familiar with the console, you can use a tool like &lt;a href="https://www.fileshredder.org/"&gt;&lt;em&gt;File Shredder&lt;/em&gt;&lt;/a&gt;. You can find &lt;a href="https://www.fileshredder.org/fileshredder-help.php"&gt;more information&lt;/a&gt; for the easy process on their website.&lt;/p&gt;

&lt;p&gt;Otherwise you can use &lt;code&gt;shred&lt;/code&gt; on unix systems to &lt;strong&gt;delete and overwrite&lt;/strong&gt; the selected file(s). An example usage with 10 iterations could be:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;shred -fuz -n 10 passwords.csv
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;-f&lt;/code&gt; operator forces the overwrite, &lt;code&gt;-z&lt;/code&gt; overwrites the file with zeros to hide the operation, and &lt;code&gt;-u&lt;/code&gt; finally deletes the overwritten file.&lt;br&gt;
More information about the &lt;em&gt;shred&lt;/em&gt; command can be found &lt;a href="https://wiki.ubuntuusers.de/shred/"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;In times where we all are registered on hundreds of sites, one of your passwords can be leaked very easily. Therefore, it should be common practice to use a password manager and different and random passwords for each site.&lt;br&gt;
If you then remember these simple steps, you can prevent a leak of one of the most important things in your life - your password database.&lt;br&gt;
Keep it safe and keep it close! 🔒&lt;/p&gt;

&lt;h6&gt;
  
  
  Image credit goes to &lt;a href="https://dribbble.com/Ivan_Haidutski"&gt;Ivan Haidutski&lt;/a&gt;
&lt;/h6&gt;

</description>
      <category>security</category>
      <category>password</category>
      <category>bitwarden</category>
      <category>lastpass</category>
    </item>
  </channel>
</rss>
