Fig 7.18  Running John the Ripper to crack passwords