How do hackers keep checking different passwords against the leaked hash-key without getting shut out after x attempts?

347 viewsOtherTechnology

If they don’t know the function generating the hash-key, what do they test it against? I assume every website uses a unique function for converting passwords into keys.

In: Technology

8 Answers

Anonymous 0 Comments

They test the leaked password against a table of prehashed values, called a rainbow table. If there is a match, the result is they have the plaintext password to log in with.

[https://en.wikipedia.org/wiki/Rainbow_table](https://en.wikipedia.org/wiki/Rainbow_table)

You are viewing 1 out of 8 answers, click here to view all answers.