and comparing it against the stolen hashes. This is exactly how real attackers crack hashes from breaches like LinkedIn (2012), Adobe (2013), Yahoo (2013), etc. Educational use only.