A penetration tester has obtained a list of password hashes from a compromised Windows machine.
They want to recover the plaintext passwords as efficiently as possible by using a precomputed lookup table that maps hashes to passwords.
Which type of attack is this?