Home > Information > Forum > Show Topic
Show thread topic
24.06.2019
Reset Windows Password v9.3
Support for Windows 10 1903, Trusted Boot Auto-Logon, Microsoft Edge Dev ...
11.06.2019
New article
DPAPI security flaw in Windows 10
10.06.2019
Windows Password Recovery 11.7
Support for Windows 10 1903, Trusted Boot Auto-Logon, etc.
24.05.2019
Wireless Password Recovery v6.0.1
New GPU engine and automated multi-mode for recovery

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Suggestions

ksec, 08:02:02 19.09.2017 Rating: 0 #1

Suggestions  

Dear Passcape, 

it would be great to add agents on a network to allow clustering. Passware has been offering this feature for a while. Since your products are great, it would create a massive improvement in the recovery. 

Also it would be good to add in WPR something to accept a txt file with multiple masks instead to run them individually,

thanks,
 
Passcape_Admin, 08:55:40 19.09.2017 Rating: 0 #2

RE: Suggestions  

Thanks for the suggestions. Yes, distributed recovery would be very handy. We have already started new project for that. Ideally, it should support for multiple attacks and password types. However it is limited to a couple of hash types at the moment. And it is moving very slowly. Here's the link:
Distributed Password Recovery forum

Using multiple masks is a great idea. We have this feature wtitten down in our todo list for the new program. But to make it as simple to user as possible, it would be nice using in tis way:
  • User provides a list of real passwords or simple wordlist and select a preferrable attack. The program could even use a built-in dictionary.

  • The program runs down the list of passwords and generates masks for the selected attack. For example, Letmein123 could be Ullllllddd for simple mask attack or Wddd for another attack, where W is a word. Well, you got the idea.

  • User sorts out some masks or reorganize them (for example, faster should be used first) and runs the attacks


 
Entries 1 to 2 from 2  [ <<  1  >> ]