The question straight up, more explanation down below - is there a reasonably appropriate way to decrypt a somewhat recently updated Wordpress password hash, even if it may take a while to decode?
We currently have a full database backup from a while back that we have free reign to work with if need be, I'm just not sure of the starting point. We have hashcat available but I'm not sure what variables exactly should be used. We're okay to run a crack for an extended period of time if need be. I know MD5 was cracked a while back so I'm wondering if the new phpass is crackable if we have all database information available. Would greatly appreciate any insight or perhaps a pointer to the appropriate direction or resource that we can look into.