PDC4S:\HACKING\SEC560 - Network Penetration Testing and Ethical Hacking\Section4 - Post-Exploitation and Merciless Pivoting\4.6 Password Representation Formats