Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Preliminary attack
Recovering Windows hashes - preliminary attack
27.01.2017
Wireless Password Recovery v4.0
This version can recover multiple handshakes simultaneously almost without speed loss
24.01.2017
Reset Windows Password v7.0.5
New features to recovery Internet and network passwords
27.12.2016
Happy New Year!
New Year greetings and holidays discount
27.12.2016
Windows Password Recovery v11.1
Some minor improvements, changes in DPAPI engine

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - preliminary attack



Preliminary attack

Preliminary attack (developed in Passcape Software) is quite effective against short, simple, dictionary, repetitive, keyboard, etc. passwords and consists of several mini-attacks. Each mini-attack can be enabled/disabled individually.

Preliminary attack run about 5-10 minutes or even faster. It consists of at least the following sub-attacks:

  • Common brute-force attack. Performs several simple brute-force attacks based on predefined character sets. 
  • Simple dictionary attack. Fast check the password by verifying all words from a given dictionary.
  • Extended dictionary attack. It's almost the same as above but with some smart mutation options set on.
  • Attack on repeatable symbols. Checking passwords as a repeatable sequence of a character. Eg. '1111111' or 'xxxxxxx'.
  • Attack on simple patterns, like '123456' or 'qwerty'.
  • Attack on complex patterns. The same as above, for compound patterns.
  • Keyboard attack checks for keyboard passwords and all possible combinations. Eg. 'qwer', 'qazwsx', 'asdzxc', etc.
  • National keyboard attack. The same as above, but checks passwords typed in national keyboard layout.
  • Complex keyboard attack is the same as previous 2 attacks, for compound keyboard patterns.
  • Passcape Password Prediction attack is the most complicated and state-of-art password prediction tool.
  • Attack on name-based passwords.
  • Attack on hex passwords (eg. 7A49F3).
  • Attack passwords based on numeric words.
  • Search for short passwords that were created using non-standard UNICODE characters.