You are conducting a penetration test on an organization's network when you intercept a set of hashed credentials. After identifying the hash algorithm as MD5, you decide to use a dedicated tool to crack the hashes. Given the nature of MD5's vulnerabilities to brute force attacks, which of the following tools would be the most appropriate choice for this task?
Netcat
John the Ripper
Hashcat
SQLmap