Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Preliminary attack
Recovering Windows hashes - preliminary attack
09.12.2019
Reset Windows Password v9.5
Support for Windows 10 1909, virtual OSes
06.12.2019
Wireless Password Recovery v6.1
This version brought some major improvements for high-performance hardware
02.12.2019
Windows Password Recovery 12.1
Support for Windows 10 1909
28.11.2019
Black Friday
It's time for a purchase:
20% discount for everything: BLACK2019

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - preliminary attack



Preliminary attack

Preliminary attack (developed in Passcape Software) is quite effective against short, simple, dictionary, repetitive, keyboard, etc. passwords and consists of several mini-attacks. Each mini-attack can be enabled/disabled individually.

Preliminary attack runs about 5-10 minutes or even faster. It consists of at least the following sub-attacks:

  • Common brute-force attack. Performs several simple brute-force attacks based on predefined character sets. 
  • Simple dictionary attack. Fast check the password by verifying all words from a given dictionary.
  • Extended dictionary attack. It's almost the same as above but with some smart mutation options set on.
  • Attack on repeatable symbols. Checking passwords as a repeatable sequence of a character. Eg. '1111111' or 'xxxxxxx'.
  • Attack on simple patterns, like '123456' or 'qwerty'.
  • Attack on complex patterns. The same as above, for compound patterns.
  • Keyboard attack checks for keyboard passwords and all possible combinations. Eg. 'qwer', 'qazwsx', 'asdzxc', etc.
  • National keyboard attack. The same as above, but checks passwords typed in national keyboard layout.
  • Complex keyboard attack is the same as the previous 2 attacks, for compound keyboard patterns.
  • Passcape Password Prediction attack is the most complicated and state-of-art password prediction tool.
  • Attack on name-based passwords.
  • Attack on hex passwords (eg. 7A49F3).
  • Attack passwords based on numeric words.
  • Search for short passwords that were created using non-standard UNICODE characters.