"That's a different issue. Reversing encryption and hash cracking are different beasts, so your point is irrelevant."
They are different - and that is the whole point - and is entirely relevant.
From Windows 2K3 onwards, Active Directory passwords are by default not stored using any sort of reversible encryption or crackable (LanMan) hash. They are only stored as a complex one way hash function. Therefore there is no way of recovering the original password other than brute force. Which is likely not computationally feasible for anything complex and at least ~ 8 characters or longer.