Jane Doe, an ethical hacker, is attempting to crack the password of ABC company's head of the IT department. She is using a rainbow table and observes that additional characters are added to the password after submitting it. What countermeasure is the company using to protect against rainbow tables?
Comments