Discover tools and techniques to crack password hashes and use those hashes to gain unauthorized access to systems.
CEHv10: Password Attacks Part 2