I have found the hashed passwords, and I have located the code that does the hash to check against the stored hashed passwords. My question is “Am I expected to reverse engineer the code to reveal the hashed passwords?”. I just think that considering that I was over thinking the previous two levels that I am probably over thinking this one as well as it seems a massive jump in complexity. All I am really asking is “Am I on the right path?”.