A penetration tester would like to crack a hash using a list of hashes and a predefined set of rules. The tester runs the following command:
hashcat.exe -a 0 .\hash.txt .\rockyou.txt -r .\rules\replace.rule
Which of the following is the penetration tester using to crack the hash?
Alex818119
6 months, 1 week agoLearner213
6 months, 1 week agostudy_study
3 months, 3 weeks agozemijan
6 months, 4 weeks ago