How do hackers keep checking different passwords against the leaked hash-key without getting shut out after x attempts?

267 viewsOtherTechnology

If they don’t know the function generating the hash-key, what do they test it against? I assume every website uses a unique function for converting passwords into keys.

In: Technology

8 Answers

Anonymous 0 Comments

so hackers use what’s called a rainbow table or just pre-compute a bunch of hashes for common passwords. they just compare their hashes to the leaked one. if the hashes match then they got the password. and yeah most sites have unique hashing methods but like you said sometimes they can brute force common passwords using lots of attempts without getting noticed. that’s why having a long password is key bro.

You are viewing 1 out of 8 answers, click here to view all answers.