{"id":486,"date":"2021-10-29T03:52:37","date_gmt":"2021-10-29T01:52:37","guid":{"rendered":"https:\/\/infosecscout.com\/?p=486"},"modified":"2023-11-22T13:00:13","modified_gmt":"2023-11-22T12:00:13","slug":"how-do-hackers-get-hashed-passwords","status":"publish","type":"post","link":"https:\/\/infosecscout.com\/how-do-hackers-get-hashed-passwords\/","title":{"rendered":"How do Hackers get Hashed Passwords?"},"content":{"rendered":"\n

It is a common thing to hear people complain of fraudsters hacking their accounts. One wonders how possible this is, since most people never reveal their passwords. For many, such acts lead to losing their funds, while others get locked out from their social media handles. But how do passwords get hacked in the first place?<\/p>\n\n\n\n

As a whole, your passwords are always stored in a database or backend storage on each website or app you use. Passwords are not kept in plain text, but in hashed format (encrypted one way or another). By using specific attack strategies, hackers may access to this hashed password.<\/strong><\/p>\n\n\n\n

In this article, I will give you 5 examples of how hackers can get hashed passwords. They will then use techniques like brute-force<\/a> or a rainbow table<\/a> to decrypt the weaker passwords in the database.<\/p>\n\n\n\n

\n
\n

Table of Contents<\/p>\nToggle<\/span><\/path><\/svg><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n