Wireless Password Recovery - recovering WPA hashes
This wireless networking utility provides over ten different password recovery methods, making it by far the most versatile of such solutions ever available. Some of these methods are only available with Wireless Password Recovery and cannot be found in any other competing products.
Smart recovery
Preliminary recovery (developed by Passcape Software) is based upon a social engineering and consists of several mini attacks. Preliminary recovery is very fast, compared to other ones, and often it is used for guessing simple passwords when there's no need to launch a fully scalable attack.
More information... |
 |
AI recovery is a brand-new type of hacking WPA hashes developed in our company. It is based upon a social engineering and allows to recover quickly some hashes loaded from local PC.
More information... |
 |
Fingerprint recovery was developed by Passcape Software. The attack parses input wordlist to generate so-called 'fingerprints' used to recover the original text passwords. It is quite effective in looking for difficult passwords.
More information... |
 |
Common attacks
Tries all possible combinations from the specified range of characters. This is the slowest recovery method, so it is really great for short passwords only and used rarely in WPA hashes recovery.
More information... |
 |
It is the most popular recovery method when the program tries each word from input wordlist you specify until it finds the original password or until the wordlist is out of words. This method is quite efficient because many people use regular words or phrases for their password. Besides this type of recovery is performed quite fast compared to the brute-force attack, for instance. Additional dictionaries can be downloaded and used from within the program or you can order a full set of wordlists on CDs.
More information... |
 |
Password recovery using a mask is a variation of the brute-force attack, except that some characters for finding the password remain unchanged, and only a portion of the password may change. The special syntax is used for setting a custom rule for finding a password.
More information... |
 |
Advanced recovery
Base-word recovery was developed by Passcape and it is efficient pretty well if a portion of the password to be recovered is known to us. However, unlike in the previous attack, you do not have to set a mask - just provide a basic word. The program will take care of the rest. The base-word recovery is based upon the experience of the social engineering to generate a great number of possible passwords to be checked.
More information... |
 |
Combined dictionary attack (developed by Passcape) uses to find compound passwords. For example, 'nothingtodo', 'I give up' or 'to_be_or_not_to_be'. It is very similar to the dictionary recovery, except that instead of using a single word for password verification it uses a combination of words created by combining words from several source wordlists. You can set your own password generation rules.
More information... |
 |
It is like a simple dictionary recovery, except that it allows a user to customize word mutation and set your own password mutation rules. The rule definition syntax is compatible with some other password recovery software. Password hashes are recoverable from a wide variety of sources using Wireless Password Recovery. It is even able to load up password hashes from non-bootable operating systems, network dumps and network sniffer logs. The software supports wordlists in a variety of formats and encodings including ASCII, UNICODE, UTF8, RAR, ZIP and PCD.
Read more... |
 |
Developed by Passcape. It is very efficient against complex passwords. The main idea of it is to guess the password by searching through frequently used phrases, lyrics, sayings, quotes, etc. The official website provides an extensive collection of specialized wordlists for the pass-phrase recovery. You can download pass-phrase wordlists from our site only.
More information... |
 |
Other
Batch recovery (developed in Passcape Software) creates a list of attacks to be run one-by-one so that you could launch all of them with a single mouse-click.
More information... |
 |