Home > Information > Forum > Show Topic
Show thread topic
13.09.2021
Office password recovery tools
Guaranteed password recovery for Microsoft Office documents with 40-bit encryption
31.08.2021
Reset Windows Password v10.5
Introducing system and interface restrictions editor
25.08.2021
WPA password recovery benchmarks
New CPU and GPU devices
30.07.2021
Reset Windows Password v10.4.1
Support for Windows 10 21H1 and some extra enhancements

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Suggestions

ksec, 08:02:02 19.09.2017 Rating: 0 #1

Suggestions  

Dear Passcape, 

it would be great to add agents on a network to allow clustering. Passware has been offering this feature for a while. Since your products are great, it would create a massive improvement in the recovery. 

Also it would be good to add in WPR something to accept a txt file with multiple masks instead to run them individually,

thanks,
 
Passcape_Admin, 08:55:40 19.09.2017 Rating: 0 #2

RE: Suggestions  

Thanks for the suggestions. Yes, distributed recovery would be very handy. We have already started new project for that. Ideally, it should support for multiple attacks and password types. However it is limited to a couple of hash types at the moment. And it is moving very slowly. Here's the link:
Distributed Password Recovery forum

Using multiple masks is a great idea. We have this feature wtitten down in our todo list for the new program. But to make it as simple to user as possible, it would be nice using in tis way:
  • User provides a list of real passwords or simple wordlist and select a preferrable attack. The program could even use a built-in dictionary.

  • The program runs down the list of passwords and generates masks for the selected attack. For example, Letmein123 could be Ullllllddd for simple mask attack or Wddd for another attack, where W is a word. Well, you got the idea.

  • User sorts out some masks or reorganize them (for example, faster should be used first) and runs the attacks


 
Entries 1 to 2 from 2  [ <<  1  >> ]