Anonymous ID: 70917c Jan. 1, 2018, 11:20 a.m. No.223649   🗄️.is 🔗kun   >>3661 >>3723 >>3807

>>223518

>>223513

To add to this: Its a way one hash.

password: superQ

ends up looking something like this: 0e81794384491161f1777c12fad6a93f8146f337a69a25e73043362938b9824

in the database. Only way to crack is to keep guessing the exact password or the exact salt above (from a list of associated passwords to hash tables), not by reverse engineering the random salt above.

Not happening in the time frame for this project.

Hashfags feel to correct anything I've posted.