Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Custom recovery
Custom recovery attacks
22.09.2020
Wireless Password Recovery v6.3.0
Support for NVidia 3xxx GPUs
21.08.2020
Reset Windows Password v9.8
Enhanced password recovery and password lookup algorithms
07.08.2020
Wireless Password Recovery v6.2.9
Security issue fix
16.07.2020
Wireless Password Recovery v6.2.8
Password filters, improved performance for top devices

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password: custom recovery

Once the custom recovery option is set, the program can additionally run 3 different attacks to guess the passwords:

  • Dictionary attack
  • Hybrid attack
  • Mask attack
 

Dictionary attack

Dictionary attack

A dictionary attack tries passwords, which are most likely to succeed, typically derived from a wordlist. Reset Windows Password supports for different types of dictionaries: ASCII, UNICODE, UTF8, as well as encrypted/compressed dictionaries in the native PCD format. You can use both predefined and custom dictionaries. To add your own wordlist, copy one to a USB drive and attach the drive to the target PC. The mutation level determines how many combinations (based on social engineering rules) will be generated for every word of the wordlist(s).


 

Hybrid attack

Hybrid attack

A hybrid attack is similar to a dictionary one, except that you can set your own word mutation rules. The program comes with a huge set of rule-files. Just use one that is best for your task. The good thing in a Hybrid attack is that you can additionally create, edit and modify password mutation rules according to your needs.

 

Mask attack

Searching and decrypting Windows passwords

A Mask attack is an irreplaceable tool when you know a part of the password or have any specific details about it. For example, if you know that the password consists of 12 characters and starts with 'loveme', obviously it's just enough to guess the last 6 characters of the password. That is what the mask attack is for. In our example, you can set the following mask: loveme%c%c%c%c%c%c