This is a dedicated watch page for a single video.
Following the attack on a dating web service, Alex received a dump of all user passwords in a hashed form. Recognizing the hashing algorithm, Alex began the process of identifying passwords. If the service employed hashing without salt, what attack is he most likely to use?