Home > Preliminary recovery
Recovering passwords using preliminary attack
01.12.2020
Reset Windows Password v9.9
Support for Windows 10 20H2, logon policy editor
26.11.2020
Windows Password Recovery v13.2
An improved version of the dictionary generation tool
29.10.2020
Windows Password Recovery v13.1
Support for TPM in Windows Hello credentials explorer
22.09.2020
Wireless Password Recovery v6.3.0
Support for NVidia 3xxx GPUs

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Password Recovery - preliminary attack


Preliminary recovery

Preliminary recovery (developed in our company) is quite effective against short, simple, dictionary, repetitive, keyboard, etc. passwords and consists of several mini-modules. You can turn on/off each mini-attack separately.

Preliminary attack runs about 20-30 minutes (depending on the hardware used and password hash algorithm) or even faster.

Mini-modules of the Preliminary recovery:

  • Attack against names. Verify various combinations of the document/user/network (or whatever) name.
  • Dates attack. Checks passwords that were based on date. For example, 12031994.
  • Simple dictionary attack. Fast check the password by verifying all words from a given wordlist.
  • Attack on repeatable. Checking passwords as a repeatable sequence of a character. Eg. '1111111' or 'xxxxxxx'.
  • Attack on simple character patterns, like '123456' or 'qwerty'.
  • Attack on complex character patterns, like '123qaz' etc.
  • Keyboard attack looks for keyboard passwords and all possible combinations. Eg. 'qwer', 'qazwsx', 'asdzxc', etc.
  • The same as above but checks international passwords.
  • Complex keyboard attack is the same as the previous 2 attacks but checks compound keyboard patterns.
  • Smart keyboard attack guesses complicated keyboard combinations.
  • Passcape Password Prediction attack is the most complicated and state-of-art password prediction tool.
  • Attack passwords based on numbers.
  • Attack against short passwords based on hexadecimal values.