Watch this video on YouTube
Jenny is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, she finds a list of hashed passwords. Which of the following tools would not be useful for cracking the hashed passwords?