Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Custom recovery
Custom recovery attacks
25.12.2022
Happy Holidays!
New Year Sales
14.11.2022
Reset Windows Password v12.2
Resource usage monitor, wireless password locator, network drive mapper
09.11.2022
Hindi translation
A Hindi translation of the paper dedicated Windows Hello biometrics flaw
11.10.2022
Office password recovery tools
Support for Nvidia RTX 4xxx devices

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password: custom recovery

Once the custom recovery option is set, the program can additionally run 3 different attacks to guess the passwords:

  • Dictionary attack
  • Hybrid attack
  • Mask attack
 

Dictionary attack

Dictionary attack

A dictionary attack tries passwords, which are most likely to succeed, typically derived from a wordlist. Reset Windows Password supports different types of dictionaries: ASCII, UNICODE, UTF8, as well as encrypted/compressed dictionaries in the native PCD format. You can use both predefined and custom dictionaries. To add your own wordlist, copy one to a USB drive and attach the drive to the target PC. The mutation level determines how many combinations (based on social engineering rules) will be generated for every word of the wordlist(s).


 

Hybrid attack

Hybrid attack

A hybrid attack is similar to a dictionary one, except that you can set your own word mutation rules. The program comes with a huge set of rule files. Just use one that is best for your task. The good thing in a Hybrid attack is that you can additionally create, edit and modify password mutation rules according to your needs.

 

Mask attack

Mask attack

A Mask attack is an irreplaceable tool when you know a part of the password or have any specific details about it. For example, if you know that the password consists of 12 characters and starts with 'loveme', obviously it's just enough to guess the last 6 characters of the password. That is what the mask attack is for. In our example, you can set the following mask: loveme%c%c%c%c%c%c

Refer to this page to get more detailed information on how the mask works and its syntax.