In this video, we'll see how passwords are cracked. Passwords are not saved as plain texts. Any website in this age uses a hashing algorithm to encrypt and manage passwords. There are many types of hashing algorithms, such as sha-1, md5, etc. As an example for this video, let's consider Facebook. To log into your Facebook account, you enter your email and password and click on "Log In". The first time you create a Facebook account, you are asked to fill in a form with your name, email address, and choose a password, birth date, and gender. Once you click on "Sign Up", this data is sent to Facebook's back-end database. In the Facebook's database, your name, gender, age, and email or phone are saved as they are. However, the password is not saved as a plain text. Instead, it is given as input to a hashing algorithm, and the output of this algorithm is the encrypted form of the password. This hashed password is saved in Facebook's database, not the plain text form. Suppose Facebook had a data breach and hackers gained access to Facebook's user info, including names, ages, genders, emails, and passwords. Even though hackers have this information, they will not be able to log into any specific user account because the password is encrypted. If the hacker tries to log in with the hashed password, they will not be granted access. The hacker needs the password in plaintext form. The only possible way for the hacker is to reverse the hash into its plaintext form. However, this is highly impossible because a hash is a one-way function and the plaintext form cannot be obtained from the hash itself. This is how hashing algorithms are designed. The strength of the password comes into play in situations like this. If you are using...