Home > Products > Network passwords > Wireless Password Recovery > Screenshots > Recovering WPA hashes > Preliminary recovery
Finding WPA passwords using preliminary recovery
25.12.2022
Happy Holidays!
New Year Sales
14.11.2022
Reset Windows Password v12.2
Resource usage monitor, wireless password locator, network drive mapper
09.11.2022
Hindi translation
A Hindi translation of the paper dedicated Windows Hello biometrics flaw
11.10.2022
Office password recovery tools
Support for Nvidia RTX 4xxx devices

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Wireless Password Recovery - preliminary recovery


Preliminary recovery

Preliminary recovery (developed in our company) is quite effective against short, simple, dictionary, repetitive, keyboard, etc. passwords and consists of several mini-modules. You can turn on/off each mini-attack separately.

Preliminary attack runs about 5-10 minutes or even faster.

Mini-modules of the Preliminary recovery:

  • Attack against SSID names. Verify various combinations of the wireless network name.
  • Dates attack. Checks passwords that were based on date. For example, 12031994.
  • Simple dictionary attack. Fast check the password by verifying all words from a given wordlist.
  • Attack on repeatables. Checking passwords as a repeatable sequence of a character. Eg. '1111111' or 'xxxxxxx'.
  • Attack on simple character patterns, like '123456' or 'qwerty'.
  • Keyboard attack looks for keyboard passwords and all possible combinations. Eg. 'qwer', 'qazwsx', 'asdzxc', etc.
  • Complex keyboard attack is the same as the previous 2 attacks but checks compound keyboard patterns.
  • Smart keyboard attack guesses complicated keyboard combinations.
  • Passcape Password Prediction attack is the most complicated and state-of-art password prediction tool.
  • Attack passwords based on numbers.
  • Guess passwords based on MAC address