I have read that SHA-2 is currently unbroken due to the amount of resources and time it would take to crack the hashing, but if we have the step by step algorithm, why can we not just do the steps backwards?
Hash functions are designed to be hard to invert. If you try to invert without knowledge of the password, there are many many unknown variables and relations that need to be solved for.
Latest Answers