How do hackers keep checking different passwords against the leaked hash-key without getting shut out after x attempts?

359 viewsOtherTechnology

If they don’t know the function generating the hash-key, what do they test it against? I assume every website uses a unique function for converting passwords into keys.

In: Technology

8 Answers

Anonymous 0 Comments

They would usually use a known function, it is the hash itself which is the somewhat secret information. Once they have the hash they can test against it on their own machines, there is nobody to lock them out.

You are viewing 1 out of 8 answers, click here to view all answers.