How To Use Hash Values( Cryptography)

 

Write a 2 -3 page paper on how one can use hash values to log into a system, crack a network, etc.

Be sure to explain how hash values are used and misused in a system. 

Cite your sources!!!!