You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action
Depends on what do you need it for.
If you want just to copy the registry and AD files to another location, click Passcape button (at the bottom-left), run command line and copy the files using xcopy command.
However there's no need to backup the files manually. The program prompts you to create a rollback file before make any critical changes to your system.
We're now working on our new utility for recovering Windows hashes. It will be able to backup (save) registry files and Active Directory database of a running system.
Sure. The first version will be quite feature-rich, however GPU is not planning to be released in first versions.
Now it has some additional tools and 4 types of hashes import:
1. Import from local machine
2. Remote computer
3. Import from binary files, both registry and active directory are supported
4. Migration from other programs (8 types)
Recovery will include 10 attacks. Almost all of them are being rewriting. All attacks support multi-threading.
Bruteforce runs at the following speed now (CPU 2,3 Ghz):
LM - 13-15 mln password/sec per processor core
NT - 20-25 mln password/sec per processor core