Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Batch attack
Recovering Windows hashes - batch attack
11.06.2019
New article
DPAPI security flaw in Windows 10
10.06.2019
Windows Password Recovery 11.7
Support for Windows 10 1903, Trusted Boot Auto-Logon, etc.
24.05.2019
Wireless Password Recovery v6.0.1
New GPU engine and automated multi-mode for recovery
15.05.2019
Internet Explorer Password Recovery v5.1
New algorithm of password extraction for Windows 8/10 OSes

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - batch attack



Batch attack


Since each attack covers its own password range, sometimes, in order to fully recover password hashes, you have to run several different attacks one after another. The basic idea behind the batch attack (developed by Passcape Software) is to create a list/batch of attacks to be run one after another, so that you could launch all those attacks with a single click of the mouse and not hassle with configuring each of them individually every time you need them.

The batch attack options are available as a list that you can extend or cut (buttons [ + ] and [ - ] ). Each attack on the list can be moved up or down (buttons [ ^ ] and [ v ] ), and its settings can be edited. A batch can include several attacks of the same kind, but of the attacks can have different settings. The pane to the right of the selected entry displays the properties of the selected entry; brief specifications of the attack and the estimated time the attack will take to complete.