This type of attack targets passwords and HASH functions and is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands or millions of likely possibilities often obtained from lists of past security breaches. This technique seeks to find the result without necessarily testing all possible mathematical possibilities.
Important to say that there is no guaranteed security against a weak or leaked password. This affects any password-based program and systems worldwide. But to mitigate these risks, some procedures can be implemented:
These methods raise the OBAKE-512 security much higher than necessary to resist this attack.
Bibliographic references
H.C.A. Tilborg et al., "Encyclopedia of Cryptography and Security", H. C. A. v. Tilborg Ed., SpringerScience+Business Media LLC, 2011.
Lookup-Table Attack, https://hashcat.net/wiki/doku.php?id=table_lookup_attack