Home > Information > Forum > Show Topic
Show thread topic
27.05.2020
Windows Password Recovery v13
With support for domain cached credentials
22.05.2020
New article on Wireless Password Recovery
Using the program's intelligence to automate the password recovery process for wireless networks
06.05.2020
Network Password Recovery Wizard v5.9
Minor enhancements recovering remote desktop passwords
24.04.2020
Mozilla Password Recovery v5.9
Support for new password encryption

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Suggestions

ksec, 08:02:02 19.09.2017 Rating: 0 #1

Suggestions  

Dear Passcape, 

it would be great to add agents on a network to allow clustering. Passware has been offering this feature for a while. Since your products are great, it would create a massive improvement in the recovery. 

Also it would be good to add in WPR something to accept a txt file with multiple masks instead to run them individually,

thanks,
 
Passcape_Admin, 08:55:40 19.09.2017 Rating: 0 #2

RE: Suggestions  

Thanks for the suggestions. Yes, distributed recovery would be very handy. We have already started new project for that. Ideally, it should support for multiple attacks and password types. However it is limited to a couple of hash types at the moment. And it is moving very slowly. Here's the link:
Distributed Password Recovery forum

Using multiple masks is a great idea. We have this feature wtitten down in our todo list for the new program. But to make it as simple to user as possible, it would be nice using in tis way:
  • User provides a list of real passwords or simple wordlist and select a preferrable attack. The program could even use a built-in dictionary.

  • The program runs down the list of passwords and generates masks for the selected attack. For example, Letmein123 could be Ullllllddd for simple mask attack or Wddd for another attack, where W is a word. Well, you got the idea.

  • User sorts out some masks or reorganize them (for example, faster should be used first) and runs the attacks


 
Entries 1 to 2 from 2  [ <<  1  >> ]