If they don’t know the function generating the hash-key, what do they test it against? I assume every website uses a unique function for converting passwords into keys.
They would usually use a known function, it is the hash itself which is the somewhat secret information. Once they have the hash they can test against it on their own machines, there is nobody to lock them out.
Latest Answers