Vickie Li·Follow1 min read·Jun 22, 2020--1ListenShareThis mostly applies to weak passwords! If the passwords behind the hashed values are weak, attackers can crack the password with tools like John the Ripper, etc.