Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Base-word attack
Recovering Windows hashes - base-word attack
Wireless Password Recovery v6.8.5
Minor update and bug fix
Reset Windows Password v13.2
A new feature for removing junk files and cleaning up registry files.
Windows Password Recovery v15.3.0
Windows Credentials Explorer
Reset Windows Password v13.1
Forensic tools to analyze Remote Desktop activity in Windows

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - base-word attack

Base-word attack

Base-word attack (developed by Passcape Software) is in many ways similar to mask attack. However, here you don't need to set up the syntax; simply enter the keyword, which supposedly was the base word for the password. It is an irreplaceable recovery tool when you know a portion of the password or its basic component. Normally, such cases dispose to using mask attack; however, it does not always allow coping with the task set forth. Suppose our password was 'S10wDr1v3r'. Trying to recover such a complicated password using brute-force attack would be an ungrateful job, even if you are quite sure that it is based upon the 'slowdriver' word. These are the cases when the base-word attack will rescue you.

With this tool, the program will attempt to recover the original password, trying all possible combinations founded upon 15 groups of rules (total over 150 rules.) If you enter 'slowdriver' in the field, you will see that the program has generated several thousands of different combinations upon this phrase, and one of those combinations could match our password.

If you remember the original password precisely and simply have forgotten the sequence of the upper-case and lower-case characters in it, you can select the option 'Use only case mutations'. With this option selected, the program will generate passwords with all possible combinations of upper-case and lower-case characters, total 2^n passwords, where n - is password length. For example, for the password 'slowdriver' the program will generate 2^10=1024 different combinations for each keyboard layout installed on your computer. You can also generate a dictionary on those mutations and save it on a disk (available not in all editions).

Note, if your password length exceeds 15-16 characters, it may take quite some time to prepare (mutate) the password for the attack.
In Windows Password Recovery version 9.5 the Base-word recovery was split into 2 modes: single input word and many input words. The multiple input words mode acts like the Dictionary attack with maximal mutations set on but generates much much more passwords (even if the mutation level of the Base-word attack is set to 'Weak'), which may be useful in a certain situation.