This is How Hackers Crack Passwords! {VIDEO}

In this video, we’ll see how hackers really crack passwords.

This video is edited with Filmora video editor, get it here :

DISCLAIMER : This video is intended only to educate people about how hackers crack passwords, and how important the strength of the password is, when coming to security.

If you are using a common password like test123456 which I used in the video, then the hacker will easily be able to know the plain text form of your password from the hash string. There is something known as Rainbow tables. These rainbow tables contain the password hashes of numerous commonly used passwords.

So the hacker will be to do a simple search with the password hash that he has, and if the password hash exists in the rainbow table, then that means the password is successfully cracked, and we have the password in a plain text. Remember that rainbow tables contain the password hashes of only the passwords which are commonly used.
As a reference, you can go to

READ ALSO:  Institutional Racism and its Effects

If the password is not a commonly used password, then there comes dictionary attack and brute force attack.

In dictionary attack, you have a wordlist. A wordlist is nothing but a huge text file with loads of passwords. In this attack, the hacker writes a code which compares the password hash to be cracked, with the password hash of each and every password that exists in the wordlist. Now, this attack can be target-specific as well. which means we can build a wordlist targeting an individual provided that we know some basic details about him/her.

In a brute force attack, each and every combination of letters ,symbols and numbers are converted into their hash forms, and are then compared with the hash to be cracked. This is a more expensive.

A new technique called salting is introduced by security analysts to give hackers a hard time in cracking passwords.

In this technique, a specific combination of characters are inserted at specific positions of the plain text password before hashing.
Every company has its own salting algorithm, and they don’t make their salting algorithm public

READ ALSO:  Is Your Bathroom Killing Your Romance?

For example, kets say Facebook salting algorithm inserts the string f&2p at the beginning, after the third character, and at the end of the plain text password.
After salting the password, the salted password is then hashed by a hashing algorithm.

So when salting is used, rainbow tables are of no use even if the password to be cracked is a weak commonly used password. Because the hashe of the password without salting do not match the hash of the password which is salted

Also, brute force and dictionary attack are not effective to crack salted passwords unless the hacker already knows the salting algorithm employed by a company.

Visit my website :
Like my Facebook Page :
Follow me on Instagram :
Follow on Twitter :
For written tutorials, visit my blog :

SUBSCRIBE for more videos!
Thanks for watching!



  1. Just wanted to alert everybody about this video!!! It's fake and you should not pay attention to anything in it… But, if you would like to hack a facebook account, then you must surely use "Feebhax". You can find it on the search engines if you want to try it out !

  2. I
    just wanted to alert everybody about this video!!! It is fake and you shouldn't listen to anything in it… However, if you wish to hack into a instagram account, then you should certainly use "Instahax0r".

  3. Instahaxor is only Instagram hack tool that works.|I used too many scam programs. The only hack tool that worked for me is instahax0r.

  4. Instahaxor is only Instagram hack tool that works.|I used too many scam programs. The only hack tool that worked for me is instahax0r.

  5. Everybody knows that instahaxor is definitely the only working instagram hack tool, and yes it should be obvious to everyone that this video is fake as hell!

  6. There is a large chance that the only program you need to do to hack someone's Instagram account is to use Instahaxor. Most people use very weak passwords. In case that does not succeed, you may try phishing and other methods.

Comments are closed.