Otherwise regardless of hash crackability, one would be able to do authentication bypass by simply sniffing hashes and replaying them.
Otherwise regardless of hash crackability, one would be able to do authentication bypass by simply sniffing hashes and replaying them.