Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Dump domain cached passwords
Dump domain cached credentials
11.12.2018
Office password recovery tools
Support for new devices, some speedup when recovering MS Office 2013-2019 passwords using AMD GPUs, bugs fixups
06.12.2018
Windows Password Recovery 11.6
Support for new GPU devices, GPU health monitor, LM password recovery speedup
27.11.2018
Reset Windows Password v9.0.1
Enhanced support for newer browsers when recovering internet passwords
26.11.2018
Wireless Password Recovery v5.0.2
Minor improvements and bug fixes

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password:
dump domain cached passwords

 

Selecting data source

Selecting SECURITY and SYSTEM files

For decrypting domain cached credentials, the program needs to 'know' the location of two system registry files: SECURITY and SYSTEM. Select them from the list or, if the application was unable to locate them, provide the path to them manually.


 

Dump domain cached credentials

Dump domain cached passwords

The final dialog provides just two options:

  • Dump file format. ASCII is good for all cases, but problems may occur with non-English usernames and, respectively, with further analysis and decryption of those hashes. UNICODE supports all languages, but compatibility problems may occur when reading this format in different applications.

  • Dump file type can be either CACHEDUMP - a simple but widespread format. No compatibility problems will occur. However, this format imposes a number of restrictions. First, it does not support non-English user names. Respectively, further on, you will be unable to decrypt the account password, as it is bound to the name. Second, the current version of the CACHEDUMP format does not support operating systems Windows Vista and higher.
    Passcape format - free from these disadvantages and can be successfully used in password audit and recovery applications like, for example, Network Password Recovery.