It would be important to know how the password was processed in order to grant/deny access. It also depends on what hardware is available to the person trying to crack it, and what constitutes "normal" means.
The easiest ways to crack a password (that I know of) are:
* Using Rainbow tables (a pre-computed list of passwords and their corresponding encoded values - simply find the password file and match the encoded password to a corresponding plaintext version). IIRC, the largest tables are for 12 and 13 characters, taking up several terabytes.
* Brute force (maximum of 168^8 = 6.3*10^17 combinations) - there was a thread recently about a parallel processing application running on the gpu to crack passwords that might interest you.