- Okta, a security company, had a vulnerability where usernames over 52 characters could bypass password requirements ๐ค
- Bcrypt, a common password hashing algorithm, has a maximum input length of 72 bytes ๐๏ธ
- This means if a username exceeds this length, the hashing process can be manipulated, leading to security risks โ ๏ธ
- The vulnerability highlights the importance of careful code review and understanding the limitations of security tools ๐

![[ํ๊ตญ IT์ ์ด๋์ด ๋ฉด] ํ์ฌ๋ฅผ ๋งํ๊ฒ ํ๋ ๋ฐฉ๋ฒ 1-2](https://i2.ytimg.com/vi/acjWoe8phjA/hqdefault.jpg)



