• Passwords are Stored and Transmitted in an encrypted form called a Hash. When a User logs on to a system and enters a password, a hash is generated and compared to a stored hash. If the entered and the stored hashes match, the user is authenticated (This is called the Challenge/Response).
• Passwords may be cracked Manually or with Automated tools such as a Brute-force method or the Rainbow Table attack.
Post a Comment