CISCO md5 has seems to be different to the general MD5 hash (hence, it can be more scure in that way, it's type5)
Like what above floor mentioned, it is using a bruteforce way of matching and solving the MD5 cash called collision method. It is easy, if you have millions of password which majority of them are not high-strength password.
Don't get so "HOT" about when I am saying it's "EASY", I am merely saying, for that case, with million of user account leaked, even the password are encoded in general MD5(like what they do in this BBS) it's relatively "EASY" to retrive most of it作者: starcub 时间: 2011-12-23 21:29:24