Fig 7.18
Running John the Ripper to crack passwords