Write an essay on how one can use hash values to log into a system, crack a network, etc.

Write an essay on how one can use hash values to log into a system, crack a network, etc.