Research the John the Ripper password-cracking tool used in Linux. How might this tool be used to bypass single-factor security methodologies? Considering NIST SP 800-63b changed our thinking on passwords, what are some current password requirements you would implement within a new organization to safeguard against such tools? Provide an example.