Knowledgebase
Passcovery > Passcovery (exAccentSoft) Help Desk > Knowledgebase
» Category: FAQ  (Go back)

» Articles in this category:

 
How to use Macro language for dictionary-based attack? Article rated 3.2/5.0
Rules file in fact is just text file in Unicode/little-endian format, it can have any name. I'm attaching two sample files which can be used as rules sets via selecting them with '...' button at Wizar...
Why is the rate of RAR password searching so low? Even free PYRIT installed in my system works faster than Accent RAR Password Recovery. Are you sure that your solution is the best? Article rated 4.4/5.0
We can assure you that password recovery speed for RAR archives are the best possible with current technology. At first, don't compare WPA with RAR directly, it's different protection schemes thou...
What options (character set, length) does the program use in the preset default scenarios? Article rated 4.3/5.0
Scenarios in Accent*PR just a sets of attack. For RAR scenario file is: No dictionary based attacks NONE /a:b /c:a /min:1 /max:3 /a:b /c:s /min:4 /max:4 /a:b /c:c /min:4 /max:4 /a:b /c:d ...
How can I start password searching again upon interruption? Article rated 3.0/5.0
To resume attack you'll need to manually select .prs file created by program with current attack state. However, if password recovery process wasn't finished (i.e. program closed without being stoppe...
How is a prefix and a suffix for the password during a dictionary attack used? Article rated 3.7/5.0
For example, if the word was "test", it would try things like: 32!test, 737test, 92test!, 2$7test), #4^test&91, 6(1test842 So how would I do that with either the user interface or a macro? You...
The average speed of RAR password searching decreased twice. What is the reason? Article rated 1.0/5.0
Basically, the problems are consequences of one fundamental problem - to check one RAR password we're need to decrypt and unpack whole archive. As this is way too complex process for GPUs it's done on...
4GB Dictionary size limit Article rated 3.0/5.0
Q: There is a restriction if I use a dictionary file exceeding 4Gb. How can I use such a dictionary? A: 4GB limitation for dictionary files was implemented to increase performance and reduce total me...
Will I receive my password recovery prize if I use NVIDIA Tesla or AMD Firestream? Article rated 4.3/5.0
No, these cards are not appropriate for solving password recovery tasks. Price/performance ratio is poor. Study the performance table containing data on different video cards: http://golubev.com...
How a Unicode attack dictionary can be created? Article rated 2.1/5.0
Accent programs support Unicode UTF-16, Little Endian (signature 0xFFFE) dictionaries. Other formats of Unicode are not supported. How such a dictionary can be created in FAR Manager: ...
Do you decrypt Microsoft Office Word 2007 files? Article rated 3.0/5.0
No, unfortenately, only MS Excel/Word 97/2000 documents can be decrypted. It's possible thanks to the protection technology of these formats. In later versions MS modified the protection algoryt...
The program created a .prs file on my disk. What is this file? Article rated 3.2/5.0
The .prs (password recovery status) files contain information on the state of password searching. It contains all data required to continue an interrupted attack from the stop point. It's enough to op...
Can you guarantee a successful recovery of Excel passwords? Article rated 4.1/5.0
Not always.Some passwords are always found and removed in all versions and what is the most important - immediately. They are as follows: Password to Modify, Spreadsheets Password, VBA Password. We gu...
 

 
Powered by Help Desk Software HESK - brought to you by Help Desk Software SysAid