Home > Information > Recovering passwords
Password recovery technics
24.06.2019
Reset Windows Password v9.3
Support for Windows 10 1903, Trusted Boot Auto-Logon, Microsoft Edge Dev ...
11.06.2019
New article
DPAPI security flaw in Windows 10
10.06.2019
Windows Password Recovery 11.7
Support for Windows 10 1903, Trusted Boot Auto-Logon, etc.
24.05.2019
Wireless Password Recovery v6.0.1
New GPU engine and automated multi-mode for recovery

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Password recovery attacks

Passcape software provides over ten different password recovery methods, making it by far the most versatile of such solutions ever available. Some of these attacks are only available with our software and cannot be found in any other competing products.

 

Smart recovery

 

Preliminary recovery

Preliminary recovery (developed by Passcape Software) is based upon a social engineering and consists of several mini attacks. Preliminary recovery is very fast, compared to other ones, and often it is used for guessing simple passwords when there's no need to launch a fully scalable attack.
More information...
Preliminary recovery

Artificial Intelligence recovery

AI recovery is a brand-new type of guessing password developed in our company. It is based upon a social engineering and allows to decrypt quickly some passwords which were created on the same local PC.
More information...
AI recovery

Fingerprint recovery

Fingerprint advanced recovery was developed by Passcape Software. The attack parses input wordlist to generate so-called 'fingerprints' used to recover the original text passwords. It is quite effective in looking for difficult passwords.
More information...
Fingerprint recovery


 

Common attacks

 

Brute-force recovery

Tries all possible combinations from a specified range of characters. This is the slowest recovery method, so it is really great for short passwords only and used rarely in WPA hashes recovery.
More information...
Brute-force recovery

Dictionary recovery

It is the most popular recovery method when the program tries each word from input wordlist you specify until it finds the original password or until the wordlist is out of words. This method is quite efficient because many people use regular words or phrases for their password. Besides this type of recovery is performed quite fast compared to a brute-force attack, for instance. Additional dictionaries can be downloaded and used from within the program or you can order a full set of wordlists on CDs.
More information...
Dictionary recovery

Mask attack

Password recovery using a mask is a variation of the brute-force attack, except that some characters for finding the password remain unchanged, and only a portion of the password may change. The special syntax is used for setting a custom rule for finding a password.
More information...
Mask attack


 

Advanced recovery

 

Base-word recovery

Base-word recovery was developed by Passcape and it is efficient pretty well if a portion of the password to be recovered is known to us. However, unlike in the previous attack, you do not have to set a mask - just provide a basic word. The program will take care of the rest. The base-word recovery is based upon the experience of the social engineering to generate a great number of possible passwords to be checked.
More information...
Base-word recovery

Combined dictionary attack

Combined dictionary attack (developed by Passcape) uses to find compound passwords. For example, 'nothingtodo', 'I give up' or 'to_be_or_not_to_be'. It is very similar to the dictionary recovery, except that instead of using a single word for password verification it uses a combination of words created by combining words from several source wordlists. You can set your own password generation rules.
More information...
Combined dictionary attack

Hybrid dictionary recovery

It is like a simple dictionary recovery, except that it allows a user to customize word mutation and set your own password mutation rules. The rule definition syntax is compatible with some other password recovery software. Password hashes are recoverable from a wide variety of sources using Wireless Password Recovery. It is even able to load up password hashes from non-bootable operating systems, network dumps and network sniffer logs. The software supports wordlists in a variety of formats and encodings including ASCII, UNICODE, UTF8, RAR, ZIP, and PCD.
Read more...
Hybrid dictionary recovery

Phrase recovery

Developed by Passcape. It is very efficient against complex passwords. The main idea of it is to guess the password by searching through frequently used phrases, lyrics, sayings, quotes, etc. The official website provides an extensive collection of specialized wordlists for the pass-phrase recovery. You can download pass-phrase wordlists from our site only.
More information...
Phrase recovery


 

Other

 

Batch recovery

Batch recovery (developed in Passcape Software) creates a list of attacks to be run one-by-one so that you could launch all of them with a single mouse-click.
More information...
Batch recovery