Digital Forensics involved with Law Enforcement and/or Military Intelligence, (on provision of required court orders, warrants, etc).Does this thing have a useful (legal) function
If you can get a user's credentials for one system (say an older or less well protected system or even from a backup file), it's likely the credentials will be the same on a more protected system (or the live system in the case of a backup) within the same enterprise.Right. If you can get to the hashes, what's the point of this? Are you sure you can get to the hashes? Isn't the whole idea of this to get into the system in the first place?
How does that work, since after three failures Windows is locked?25-GPU cluster cracks every standard Windows password in <6 hours
Especially worrisome for Windows based machines which limit password length.