During a penetration testing engagement, you are tasked with testing the strength of passwords on a target network. You opt to use a popular credential testing tool to perform a brute force attack on SSH services. Which of the following tools would you use to achieve this, providing an efficient and reliable method to uncover weak credentials?
Wireshark
Hydra
Hashcat
Mimikatz