Home > Base-word recovery
Recovering passwords using Base-word attack
01.03.2024
New blog post
Dumping the history of users' IP addresses in Windows
20.02.2024
Reset Windows Password v14.1
IP addresses history viewer, fast disk search, local security editor and some more
02.01.2024
Wireless Password Recovery v6.9.0
A revision of the GPU health monitor along with some minor updates
23.12.2023
HAPPY NEW YEAR!
Happy New Year greetings and holidays discount

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Password Recovery - base-word attack


Base-word attack (developed by Passcape) is pretty much similar to the mask recovery. However, you don't have to set up the mask syntax here; simply enter the keyword, which supposedly was the base word for the password. It is an irreplaceable recovery tool when you know a portion of the password or its main part. Normally, such cases dispose to using mask recovery; however, it does not always allow coping with the task set forth. Suppose our password was 'S10wDr1v3r'. Trying to guess such a complicated password using mask recovery would be an ungrateful job, even if you are quite sure that it is based upon the 'slowdriver' word. These are the cases when the base-word attack will rescue you.

Base-word recovery

With this tool, the program will attempt to guess the original password, trying all possible combinations founded upon 15 groups of rules (total over 150 rules.) If you type 'slowdriver' in the field, you will see that the program has generated thousands of different combinations upon this phrase, and one of those combinations could match our password.

You can also generate a wordlist on those mutations and save it on a disk.

Note, if your password length exceeds 15-16 characters, it may take quite some time to prepare (mutate) the password for the recovery.