>>67This is why SHA256 is good. It's not a broken algorithm. It's cryptographically secure.
Still, you can have much stronger security with password storage, like PBKDF2 with 200,000 rounds of SHA256. That would be a LOT better than one round.
If they're not salting SHA256 hashes, you can check it against an online resource or against your own pre-built table, but really there's nothing else except bruteforcing it. Again, sha256 isn't broken. It's cryptographically secure, and very decent for things like this and also crypto signatures and integrity checks (still many ways to fuck up, but SHA256 can be used correctly).