... first combines the password with the salt and then computes the hash. The system not only stores the hash, but also the salt with the user ID. Now, when a user authenticates to the system and ... five times to overcome the restriction, finally changing them back to the old passwords. In other words, users figured out how to bypass the security restrictions. The administrator fixed this ... Packet Capture Another way to capture password hashes is to sniff them from the network as people log on. If someone can compromise a machine that is connected to the network, and they can sniff...