Okay I have a mac and I worked out a way to crack the hash...
There's an app called "mdcrack" that was mentioned on this forum much much earlier... I found a version of the source code and managed to compile it under Mac OS X (10.5, haven't upgraded to Snow Leopard yet but I can't imagine it would work any differently)
This presents another fun challenge: it doesn't compile out of the box so you have to change a bit of the C code to make it compile. As this isn't really part of the hack I'll give some huge hints: you have to include stdlib.h in most of the .c files (all of the ones with compile errors) and change some of the variable declarations to not use "register" variables. (The coders were sloppy and used register variables but then tried to assign values to them, which is a no-no)
If you have a little bit of C coding experience you should be able to work it out in a few minutes. Then compile it up, set the RESUME_FILE env var to the same as the one in the Makefile, then you can run it (using the correct hash algorithm of course)... it only takes a few seconds to find the password given the right hash.
It's pretty amazing really, it has made me think twice about what hash algorithms I use in my development! I knew there was a flaw in those algos but not that it could be cracked so easily.
happy hacking! and thanks to the HTS people for giving us a fun way to spend our christmas holidays