✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
You have successfully acquired a copy of the password hashes from a Windows XP box. In previous enumerations, you've discovered the network policy requires complex passwords of at least eight characters. Which of the following offline password attacks would be best suited to discovering the true passwords?