Hashcat Attack Modes Explained