I read that when hackers steal passwords, usually they come in hashes and they have to bruteforce them. How do they know which algoryrythm was used to make the hashes so they cant bruteforce them?
[link] [comments]
from hacking: security in practice https://ift.tt/2UVSIjV
Comments
Post a Comment