One of the biggest security holes are user passwords, as every password security study shows. This tool is a proof of concept, to give researchers and security consultants a way to demonstrate how easy it would be to gain unauthorized access to a remote system. THIS TOOL IS FOR LEGAL PURPOSES ONLY! Requires: subversion (available in Slackware) apr & apr-util (available in Slackware) libssh (not libssh2, available at Slackbuilds.org) Optional: postgresql (available at Slackbuilds.org) sap (available at http://www.sap.com/solutions/netweaver/linux/eval/index.asp)