Case Study of a Breach Due to Hashing