Figure 2

Figure 2: The password cracker uses a brute force attack.