As part of security testing, I will receive around 150 to 200 Active Directory password hashes from Windows Server 2012 R2 (using NTLM?).
I have found NTLM rainbow tables (1,5 TB total), that covers all password length less or equals 8 (full ASCII), length 9 (mix-alphanumeric), length 10 (lower-alphanumeric)
http://project-rainbowcrack.com/table.htm
Should I use these tables, or is using direct bruteforcing faster since NTLM is a fast hashing algorithm and I only have around 200 hashes to crack?
I know it depends on hardware, but some insights would be appreciated.
I am not allowed to use online services.