Hi again Evilzone
I just posted a few days ago to do with how i found the school admins password and I wanted to keep a backdoor open for access at any time
I explain it more elequently here
http://evilzone.org/hacking-and-security/school-network-got-the-admin's-password/ I have made quite a lot of headway on this project but I have found something else, a .yaml file with many Usernames and passwords in it, the issue is that im not sure how it is encrypted i was wondering if you could have a look at it for me and tell me how to decrypt it
any help would be greatly appreciated 
by the way i know it says sha2 but apparently this string is too small for sha2
also i have tried base64 but that didnt work for me 
as I said any help is greatly appreciated 
--- 
- _sha2_: 8b443458a9393e8485fc96b031a7afab4e0bd7a9
- admin: 
    :device: 
    :login: admin
    :p: 18lP97fHBJZkQjJDEuImpA==
    :type: snmp
  Administrator: 
    :device: 
    :login: Administrator
    :p: ZZoIM/eAO8vEU6tCzCZx+tXU41qWvOBevuUxiH5XXWY=
    :type: wmi
  Cisco: 
    :device: 
    :login: root
    :p: BjrmO0lvEh5zTixRGbSrgQ==
    :type: http
  esx admin: 
    :device: 
    :login: root
    :p: k/Msj0boNfFoNtN5EQ3fGA==
    :type: esx
  esx root: 
    :device: 
    :login: root
    :p: 9XNI6SKSBfhN0kYyF92SgA==
    :type: esx
  local admin: 
    :device: 
    :login: Administrator
    :p: DiyCFf2mKrtB+LureWB0nQ1QDouxzkordtT1s1yio0A=
    :type: wmi
  localadmin: 
    :device: 
    :login: localadmin
    :p: /T9g/pXqd2v3eqdilhZVWNgtLhJaay4RcFV8ZO06ems=
    :type: ssh
  mac local admin: 
    :device: 
    :login: localadmin
    :p: SMEgTRIXBooP1FeRrcrSOA3eta/DbhskLdDDK2tFhv8=
    :type: ssh
  None: 
    :device: 
    :login: Will Not Try WMI
    :p: PJ19x19hPduZyth8V5O3vCLqt62GpH1KAd0H3f8avPU=
    :type: wmi
  Public: 
    :device: 
    :login: public
    :p: 1G+iFdT5x+WDmzv+6cQyag==
    :type: snmp
  schadm: 
    :device: 
    :login: schadm
    :p: Csc42VzYSe4oYV84aZM+5w==
    :type: wmi 
Thanks guys 
