MeTroiD wrote:I don't think he uses brute force, he just uses a tcl code to decipher it.
Its really possible as blowfish always encrypts a password the same way
what blowfish does the same way is using the same seed every time, because it must be able to check your password against the stored hash, and that can only be done with the same seed
this doesn't mean your friend can decipher that hash, as he can't decipher a MD5 hash, or any other strong one-way hash (and blowfish is probably one of the strongest) - that's why it's called one-way, because you can't decipher it - or if you or your friend claim that you can - I suggest you apply for a job with RSA and get a deserved 6-figures salary
the only thing your friend and every other cracker out there can do is to use brute force - in various ways, some more intelligent than the others, making clever use of dictionaries - to check a very large number of combinations of characters, using the very same blowfish algorithm eggdrop uses, against a hash that he has obtained one way or another
and since my password definitely doesn't even remotely fall within any dictionary your friend might have, he'd have a hard time cracking it - surely an impossible task for his home computer