Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Batch attack
Recovering Windows hashes - batch attack
Reset Windows Password v7.1.0
RWP now can create new SAM user accounts and supports for Win 10 Creators Update
Wireless Password Recovery v4.0.3
Some problems and bugs were fixed
Windows Password Recovery 11.2
Some improvements and speed optimization
Wireless Password Recovery v4.0
This version can recover multiple handshakes simultaneously almost without speed loss

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - batch attack

Batch attack

Since each attack covers its own password range, sometimes, in order to fully recover password hashes, you have to run several different attacks one after another. The basic idea behind the batch attack (developed by Passcape Software) is to create a list/batch of attacks to be run one after another, so that you could launch all those attacks with a single click of the mouse and not hassle with configuring each of them individually every time you need them.

The batch attack options are available as a list that you can extend or cut (buttons [ + ] and [ - ] ). Each attack on the list can be moved up or down (buttons [ ^ ] and [ v ] ), and its settings can be edited. A batch can include several attacks of the same kind, but of the attacks can have different settings. The pane to the right of the selected entry displays the properties of the selected entry; brief specifications of the attack and the estimated time the attack will take to complete.