Question description
Extract the password hashes from a machine. With the extracted password hashes, try to crack them using the program selected in the previous step.Submit an obfuscated list of users and cracked passwords, or output generated from the program