Home > Information > Forum > Show Topic
Show thread topic
20.09.2023
Windows Password Recovery v15.3.0
Windows Credentials Explorer
05.06.2023
Reset Windows Password v13.1
Forensic tools to analyze Remote Desktop activity in Windows
10.05.2023
Wireless Password Recovery v6.8.1
New templates to seach for default passwords of some broadband WiFi routers
24.04.2023
Reset Windows Password v13.0
Full support for Windows 11, duplicate file finder, checksum calculator and some new tools

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Suggestions

ksec, 08:02:02 19.09.2017 Rating: 0 #1

Suggestions  

Dear Passcape, 

it would be great to add agents on a network to allow clustering. Passware has been offering this feature for a while. Since your products are great, it would create a massive improvement in the recovery. 

Also it would be good to add in WPR something to accept a txt file with multiple masks instead to run them individually,

thanks,
 
Passcape_Admin, 08:55:40 19.09.2017 Rating: 0 #2

RE: Suggestions  

Thanks for the suggestions. Yes, distributed recovery would be very handy. We have already started new project for that. Ideally, it should support for multiple attacks and password types. However it is limited to a couple of hash types at the moment. And it is moving very slowly. Here's the link:
Distributed Password Recovery forum

Using multiple masks is a great idea. We have this feature wtitten down in our todo list for the new program. But to make it as simple to user as possible, it would be nice using in tis way:
  • User provides a list of real passwords or simple wordlist and select a preferrable attack. The program could even use a built-in dictionary.

  • The program runs down the list of passwords and generates masks for the selected attack. For example, Letmein123 could be Ullllllddd for simple mask attack or Wddd for another attack, where W is a word. Well, you got the idea.

  • User sorts out some masks or reorganize them (for example, faster should be used first) and runs the attacks


 
Entries 1 to 2 from 2  [ <<  1  >> ]