Home > Information > Forum > Show Topic
Show thread topic
30.07.2021
Reset Windows Password v10.4.1
Support for Windows 10 21H1 and some extra enhancements
06.07.2021
MS Office password recovery tools
Support for MS Office 97-2003 formats, a major update in the password analysis module and mask attack syntax, etc.
06.07.2021
Office recovery tools
Some major changes in the password extraction module, mask attack syntax, etc.
17.06.2021
Reset Windows Password v10.3
Disk image creation tool, Windows PIN history decryption, new HTML/email parsing engine

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Help needed

Clone2011, 17:04:31 24.01.2013 Rating: 0 #1

Help needed  

Hi guys!
I'm a newbie and need an advice in cracking wifi password. I've dumped my neighor's hashes using wireshark. Now I need to decrypt the hashes using my own dictionary. Can your program decode wifi hashes with my own wordlist? If yes, guide me how pls. Thanks.
 
IvanO, 17:26:08 24.01.2013 Rating: 0 #2

RE: Help Needed  

 Hi.
Sure, you can set any wordlist when decoding WPA hashes using the dictionary recovery :) Here's the short guide:
- First, load the dump file with handshakes into the program.
- Then you'll have to set your recovery environment (hardware). Open general settings and select CPU or GPU tab. It is highly recommended using GPU to check passwords. The recovery runs up to 20 times faster on GPUs.
- Now open 'Recovery' menu, select 'Dictionary attack' and click 'Attack settings' link below.
- Select first tab and set your own wordlist(s) here
- If you have a good GPU on board, there's a sence to set up password mutations. Just select the 'Mutation' tab and set one of the available password mutation type here.
- Save your project and run recovery (Recovery - Run)
- Be prepared that the process may take quite some time depending on the size of your wordlists, mutation type and hardware used
- For searching common passwords, it is recommended to run Preliminary attack first.

Something like that.
 
Entries 1 to 2 from 2  [ <<  1  >> ]