There comes a time in every pentest that you just simply run out of password cracking attacks to try, and you find yourself completely stumped. You've consulted your notes, performed analysis of the password policy and current cracked results, and have read your Hash Crack manual cover to cover with still no results. It's time to begin the experimentation phase and there is no better place to start than "random" password generation. One of the biggest problems is your own internal bias and constrained thinking based on past successes, but having a routine in your back pocket to break that mold might just save you face on your next engagement. This is where the Purple Rain attack comes to the rescue to assist you in breaking that mold. An additional benefit of this attack is it can run essentially autonomous for a near infinite amount of time, really only limited by the dictionary you supply. This is a perfect go-to attack if you have no time to run through the gauntlet of cracking techniques and would appreciate a "fire-and-forget" solution for the set of hashes pulled from your next pentest engagement.