\section{Part 4: Password Hashing and Cracking}