Explain how the hacker got into the system Notice the username and the password, encoded, in base

Posted Date: