Hack Facebook Method 2 - Precomputation and Salting 101

Precomputation and salting are two methods commonly used by hackers to hack facebook by get into your system to try and manipulate, as well as acquire personal data. You should know more about the processes and find out how these work so you can stay safe and make use of the necessary precautions to keep everything secure for a long period of time. Knowing the method and understanding how it works will keep hackers at bay and your system safe.


Password cracking is also known as precomputation, which is the method of recovering passwords from information that has been saved or transmitted via a computer system. A very common method includes repetitively trying to guess the password. Hackers will make use of things that are related to you, such as your address, birth date or second name. The goal of the password cracking will help the user recover a lost or forgotten password, so that you can get unauthorized access to the system or for system administrators to verify for passwords that might easily be acquired and cracked. Even though putting a wholly different password is not a security risk, you still get system administration privileges. Password cracking is used to gain access to digital evidence in court cases.

Preventing Precomputation

The ideal method for preventing the cracking of password is to make sure that hackers do not access the encrypted password. For instance, encrypted passwords on the Unix operating system were first stored in a publicly accessible file. On newer systems, these are stored within the file, and are accessible only to programs that have enhanced privileges. However, several network protocols deliver passwords in cleartext or still use weak response and challenge schemes. You can stay protected by changing your password every now and then.

About Salting

Salt is made up of random bits used as one of the many inputs to a key derivation function. The other input is usually a pass phrase or password in cryptography. The output of the key derivation
function is saved as the password's encrypted version. The salt can also become a part of a key in a cipher or another algorithm. The function usually uses a hash function. Other times, a value generated earlier, called the initialization vector, is also used as the salt. Salt information tends to complicate the dictionary attacks that invest in pre-encryption of dictionary entries, wherein every bit of salt used will double the amount of computation and saving required. The salt value should be kept secret for security purposes. A number of protocols let the salt transmit as cleartext, together with the number of iterations used in producing the key to strengthen it.

More on Salting

Salt can also keep you protected from rainbow tables, which will extend the complexity and length of the password. If the rainbow tables do not get passwords that suit the length and complexity of the salted password, the password will stay secret. Once discovered, you will have to eliminate the salt from the password, before usage. 

No comments:

Post a Comment