Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Batch attack
Recovering Windows hashes - batch attack
10.06.2020
Reset Windows Password v9.7
Support for Windows 10 2004, virtual OS password recovery
27.05.2020
Windows Password Recovery v13
With support for domain cached credentials
22.05.2020
New article on Wireless Password Recovery
Using the program's intelligence to automate the password recovery process for wireless networks
06.05.2020
Network Password Recovery Wizard v5.9
Minor enhancements recovering remote desktop passwords

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - batch attack



Batch attack


Since each attack covers its own password range, sometimes, in order to fully recover password hashes, you have to run several different attacks one after another. The basic idea behind the batch attack (developed by Passcape Software) is to create a list/batch of attacks to be run one after another, so that you could launch all those attacks with a single click of the mouse and not hassle with configuring each of them individually every time you need them.

The batch attack options are available as a list that you can extend or cut (buttons [ + ] and [ - ] ). Each attack on the list can be moved up or down (buttons [ ^ ] and [ v ] ), and its settings can be edited. A batch can include several attacks of the same kind, but of the attacks can have different settings. The pane to the right of the selected entry displays the properties of the selected entry; brief specifications of the attack and the estimated time the attack will take to complete.