John

12.2 : Post Exploitation - cracking passwords