Home > Products > Network passwords > Wireless Password Recovery > Screenshots > Recovering WPA hashes
Recovering passwords of WPA hashes
27.12.2016
Happy New Year!
New Year greetings and holidays discount
27.12.2016
Windows Password Recovery v11.1
Some minor improvements, changes in DPAPI engine
06.12.2016
New blog post
Hash encryption in Windows 10 Anniversary Update
30.11.2016
WPA password recovery benchmarks
New devices

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Wireless Password Recovery - recovering WPA hashes

This wireless networking utility provides over ten different password recovery methods, making it by far the most versatile of such solutions ever available. Some of these methods are only available with Wireless Password Recovery and cannot be found in any other competing products.


Smart recovery

 

Preliminary recovery

Preliminary recovery (developed by Passcape Software) is based upon a social engineering and consists of several mini attacks. Preliminary recovery is very fast, compared to other ones, and often it is used for guessing simple passwords when there's no need to launch a fully scalable attack.
More information...
Preliminary recovery

Artificial Intelligence recovery

AI recovery is a brand-new type of hacking WPA hashes developed in our company. It is based upon a social engineering and allows to recover quickly some hashes loaded from local PC.
More information...
AI recovery

Fingerprint recovery

Fingerprint recovery was developed by Passcape Software. The attack parses input wordlist to generate so-called 'fingerprints' used to recover the original text passwords. It is quite effective in looking for difficult passwords.
More information...
Fingerprint recovery



Common attacks

 

Brute-force recovery

Tries all possible combinations from specified range of characters. This is the slowest recovery method, so it is really great for short passwords only and used rarely in WPA hashes recovery.
More information...
Brute-force recovery

Dictionary recovery

It is the most popular recovery method, when the program tries each word from input wordlist you specify until it finds the original password or until the wordlist is out of words. This method is quite efficient because many people use regular words or phrases for their password. Besides this type of recovery is performed quite fast compared to brute-force attack, for instance. Additional dictionaries can be downloaded and used from within the program or you can order a full set of wordlists on CDs.
More information...
Dictionary recovery

Mask attack

Password recovery using a mask is a variation of the brute-force attack, except that some characters for finding the password remain unchanged, and only a portion of the password may change. The special syntax is used for setting a custom rule for finding a password.
More information...
Mask attack



Advanced recovery

 

Base-word recovery

Base-word recovery was developed by Passcape and it is efficient pretty well if a portion of the password to be recovered is known to us. However, unlike in the previous attack, you do not have to set a mask - just provide a basic word. The program will take care of the rest. The base-word recovery is based upon the experience of the social engineering to generate a great number of possible passwords to be checked.
More information...
Base-word recovery

Combined dictionary attack

Combined dictionary attack (developed by Passcape) uses to find compound passwords. For example, 'nothingtodo', 'I give up' or 'to_be_or_not_to_be'. It is very similar to the dictionary recovery, except that instead of using a single word for password verification it uses a combination of words created by combining words from several source wordlists. You can set your own password generation rules.
More information...
Combined dictionary attack

Hybrid dictionary recovery

It is like a simple dictionary recovery, except that it allows a user to customize word mutation and set your own password mutation rules. The rule definition syntax is compatible with some other password recovery software. Password hashes are recoverable from a wide variety of sources using Wireless Password Recovery. It is even able to load up password hashes from non-bootable operating systems, network dumps and network sniffer logs. The software supports wordlists in a variety of formats and encodings including ASCII, UNICODE, UTF8, RAR, ZIP and PCD.
Read more...
Hybrid dictionary recovery

Phrase recovery

Developed by Passcape. It is very efficient against complex passwords. The main idea of it is to guess the password by searching through frequently used phrases, lyrics, saings, quotes, etc. The official website provides an extensive collection of specialized wordlists for the pass-phrase recovery. You can download pass-phrase wordlists from our site only.
More information...
Phrase recovery



Other

 

Batch recovery

Batch recovery (developed in Passcape Software) creates a list of attacks to be run one-by-one, so that you could launch all of them with a single mouse-click.
More information...
Batch recovery