Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.