It is assumed this biss servers are using a combination of CW list,rainbow tables,brute force(cudabiss or similar tools made by them)
There is not much else to guess.
Is a moot point to try to impose an opinion that can be misinformed regarding how the attack is.
Hopefully we can continue the discussion,but in reality I do not see is important to know how this servers work.
Some years ago I was using a plugin that extract crypt8 from a live stream,not recorded.
And also creating the input file for cudabiss.
Is just a matter of working with the information at hand.
There is not much else to guess.
Is a moot point to try to impose an opinion that can be misinformed regarding how the attack is.
Hopefully we can continue the discussion,but in reality I do not see is important to know how this servers work.
Some years ago I was using a plugin that extract crypt8 from a live stream,not recorded.
And also creating the input file for cudabiss.
Is just a matter of working with the information at hand.