When we use open SSL passwords to generate a key, we can determine if we want to salt it or not. Without the hyphen salt option, it is much more easier for an attacker to perform an efficient dictionary attack on the password and to attack the encrypted data. The reason for this is that without the salt, the same password always generates the same encryption key. But when we use salt with the hyphens salt, it is being used at the first eight bytes of the encrypted data that is reserved for the salt. It is generated at random will encrypting the file and read from the encrypted file. When it is decrypted, so let's use salt.
This time we will use the echo command, the text will be the same text as we used before the attack will start now. And we will grab it into open SSL using the encryption command and the AES 128 bit key using CBC mode operation. But this time, we will also use the hyphen salt to solve the key. When we use salt in encryption, we're actually using a random data, a random number that is used as an additional input to our password or to a one way function as in