Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Attacking hashes > Rainbow table attack
Recovering Windows hashes - rainbow table attack
11.12.2018
Office password recovery tools
Support for new devices, some speedup when recovering MS Office 2013-2019 passwords using AMD GPUs, bugs fixups
06.12.2018
Windows Password Recovery 11.6
Support for new GPU devices, GPU health monitor, LM password recovery speedup
27.11.2018
Reset Windows Password v9.0.1
Enhanced support for newer browsers when recovering internet passwords
26.11.2018
Wireless Password Recovery v5.0.2
Minor improvements and bug fixes

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - rainbow table attack


Rainbow table attack
 

A rainbow table is a lookup table offering a time-memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, for example Windows passwords.

This is quite a sophisticated password audit tool. This method was developed by Philippe Oechslin for quick password recovery using pre-calculated tables. It's enough to say that the sought password can be recovered within minutes or even seconds.

The program supports the standard *.rt, indexed *.rti, and hybrid tables. Multithreading is supported as well.

It must be mentioned that the rainbow attack does not guarantee the recovery of all passwords, but the probability of the recovery is close to 100%, depending on the tables you've got.

A specific rainbow table can be implemented for the hash it was created for. Eg. LM specific tables should be used for breaking LM hashes only.

The attack options allow limiting the amount of RAM that can be utilized by the attack when using old computers (the attack assumes using large volumes of RAM for its calculations).