What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords? A rule attack.
There are 3 steps in a rule attack:
1) Small sample of stolen passwords file is retrieved
2) Statistical analysis is performed on the sample to find the length and characters of each password
3) Series of masks are generated and should be successful in figuring out the largest amount of passwords.