which cryptographic algorithms would be useful to gain access to the application?
seenagape
After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?