Originally posted by zeitghost
View Post
Then all you have to do is sniff off the network the encrypted password and compare it to the table entries to find the plain text equivalent without having to reverse engineer the encryption process. Much much quicker than trying to do it all on the fly.
Comment