> I'm not sure about Windows, but in UNIX, the passwords are not > decryptable. Both cracker programs and the login program encrypt what > you type in, or a guess in the case of crack and compare the string > with whats in the shadow file ( actually on modern systems, there are > PAM libraries that handle all this for you with a couple of API calls > ). Are the shadow files MD5? If they are they can be cracked, assuming you can get the shadow file. (http://www.milw0rm.com/cracker/) (well, its a brute force technique, but it can be done, with rainbow tables for md5, but you need i think around 80 gig's of tables[and the shadow hash]) > -- Derrik -- andrew -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist