I've already switched from LP to BitWarden but I'd still like to how you get from hash to text.
Some background to show where I'm starting from:
So, what are the steps that the cracker would go through to get the plain text from the hash?
Thanks,
Terry
Some background to show where I'm starting from:
I understand the meanings of hash, salt and PBKDF2 but I can't get my head around what they mean in terms of how likely a hash resulting from using them can be cracked.
At the time the LastPass vaults were stolen my master password contained 5 lower case words separated by blanks with a symbol at the end. My iteration count at that time was 100,001. Unless my ignorance is blocking me from seeing something, I think my master password is safe from cracking. Please correct me if I'm wrong.
I'm also confused about the hashing of passwords for individual accounts stored in the vault. Are those hashes generated using the same process as is used for the master password?
So, what are the steps that the cracker would go through to get the plain text from the hash?
Thanks,
Terry
