Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Batch attack
Recovering Windows hashes - batch attack
26.11.2021
Black Friday is here
It's time to save some money.
06.10.2021
Wireless Password Recovery v6.4.5
Some minor improvements, modifications, and a bug fix
13.09.2021
Office password recovery tools
Guaranteed password recovery for Microsoft Office documents with 40-bit encryption
31.08.2021
Reset Windows Password v10.5
Introducing system and interface restrictions editor

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - batch attack



Batch attack


Since each attack covers its own password range, sometimes, in order to fully recover password hashes, you have to run several different attacks one after another. The basic idea behind the batch attack (developed by Passcape Software) is to create a list/batch of attacks to be run one after another, so that you could launch all those attacks with a single click of the mouse and not hassle with configuring each of them individually every time you need them.

The batch attack options are available as a list that you can extend or cut (buttons [ + ] and [ - ] ). Each attack on the list can be moved up or down (buttons [ ^ ] and [ v ] ), and its settings can be edited. A batch can include several attacks of the same kind, but of the attacks can have different settings. The pane to the right of the selected entry displays the properties of the selected entry; brief specifications of the attack and the estimated time the attack will take to complete.