Profile

Cover photo
PasswordRecoveryTools.com
131 followers|51,145 views
AboutPostsPhotosVideos

Stream

 
 
The user wrote: «I #crackZIPpassword in your #PasscoverySuite program. Excellent speed of search at attack of a #bruteforce! But it strongly gives at attack according to the dictionary. In what the reason?»
View original post
1
Add a comment...
 
 
We have updated the productivity rating of video cards for #passwordrecovery in #Passcovery's programs. New products from NVIDIA and AMD were introduced into the rating: the NVIDIA #GeForceGTX1070/1080 and AMD #RadeonRX480 video cards.
New products from NVIDIA and AMD were introduced into the GPU password recovery rating: the NVIDIA GeForce GTX 1070/1080 and AMD Radeon RX 480 video cards.
View original post
1
Add a comment...
 
 
"I was a little bit skeptical about the service, the web is full of scum, so you can imagine my surprise when I received an email with the image of the unlocked file. Great service!
Thanks." - Dario Bigi (Campana, Argentina)

Yes, you can see #Passcovery digital certificate in your browser and get the proof of Excel/Word file successful decryption absolutely for free. No risk for you and no fakes from us. Just a successful result.
Passcovery’s unique rainbow tables guarantee 100% success! Removes passwords of any length or complexity. No software to install.
View original post
1
Add a comment...
 
 
We have had a conflict with a user from India. Satish (that’s his name) paid for decrypting a file on https://AccessBack.com, but didn't get his unprotected Excel document afterwards. We investigated the issue and glad to report the happy ending – the user is 100% satisfied and even left his testimonial:

“Thanks a lot..to solve my problem....my experience with your service is excellent and convinient...... Thanks very much.... I also received my file....good service...keep it up... ”

And here was the problem: when Satish uploaded the file to decrypt he used one e-mail address, and when he paid for the service he used another one. As a result, #AccessBack didn’t know where the #decryptedfile should be sent to. The service couldn’t link the payment to the file. And the user wasted some time on writing as and on waiting while we settle the issue.

Surely, we are great, but there are other pleasant ways to spend your time.

Don’t repeat Satish’s mistake – use the same e-mail when you upload the file to AccessBack.com and when you pay for decryption of your #passwordprotected Word or Excel file.

Or simply upload the file again using the e-mail from the order. AccessBack.com will decrypt the file again and will send the document to you without the password.
View original post
1
Add a comment...
 
+Passcovery. Just solve the lost password problem on Extended Mask usage in its #passwordrecovery products using GPU:
 
How to save your time and test only specific passwords made up of certain symbols in a certain order? See the example in our knowledge base: 
View original post
1
Add a comment...
 
We have finished transferring the main Passcovery domains to HTTPS, a secure communication protocol. Now, you can safely visit our websites knowing for sure all data exchange is under firm protection, and what you see on our website is exactly what we want to show you.

The guarantee of the secure connection is a security EV certificate you always see in the address bar of your browser: 
View original post
1
Add a comment...
 
 
A user has asked : ¨I am now #crackpassword on a CPU without #AEShardware support. If I replace it with a CPU with AES/AES-NI support, will breaking be accelerated? And will this acceleration be significant?¨

This is Passcovery's response:
View original post
1
Add a comment...
 
#CrackPassword on GPU Pascal GP104 (NVIDIA GeForce 1070/1080) at top performance.
 
We have released Passcovery Suite 3.3. The program is now faster, more versatile and reliable than ever.

Changes in Passcovery Suite 3.3:

- Support for SM 6.1 and new GPU Pascal GP104 – works on NVIDIA GeForce 1070/1080
- Support for updated NVIDIA drivers gives performance boost up to 15%
- Simplified offset setup while cracking TrueCrypt passwords
- Fixed a bug in the dictionary attack with “words” between 256 and 1024 symbols
- Fixed known bugs occurred while working with non-standard Microsoft Office 95-2003 documents

Try the revamped performance and comfort of the new Passcovery Suite. A free demo version is available at the Passcovery website.
View original post
1
Add a comment...
 
Hacking Excel 2016 password. So long, and thanks for all the fish

Goddamn Reddit has removed my comment to some student’s request (https://goo.gl/OYHxnn). Supposedly because of a link to our mega-cool password cracking software. Miserable fools! :)

The story is some fellow under the problemboy99 nick asks how to crack a password to Excel 2016. If he manages to crack it, he gets ‘passed’ for the exam or something like that. Easy money!

And then all those commenters start producing crap like ‘write a VBA macros’ or ‘open the file in OpenOffice’ and other bullshit…

Hey, people! Didn’t you read or what – the file is password protected! This is just a mean joke of the teacher, nothing more. The fellow will get his ‘passed’ in about couple of thousands years. That’s funny.

The reason is you can’t crack Excel 2016 password if you don’t have any knowledge about its structure. There are no tricks here, like guaranteed decryption of Excel 97-2003 documents (https://accessback.com). Excel 2007-2016 are different in that. The only option left is exhaustive search. And since we know nothing about password structure, we have to try all of them. Like in ‘every single f**ing password variant’. Which means, a pitiful 7-characters password will be bruteforced in about several thousands years:

Too slow? Yup. And it won’t be much faster. Trust me: our software is extra optimized in terms of performance. Yes, you can scale it up by adding more faster GPU, but that is a much more expensive way. Not a twenty bucks way, at least. :)

The rating of GPU if you are interested - https://passcovery.com/password-recovery-software/gpu-performance.htm

So, how can one #breakpassword for #Excel2016?..

This is possible only with due preparation and at least approximate knowledge or guess about what we seek. You better know something about the password structure, but the bare minimum is at least some speculations to start attacking the password.

While direct exhaustive search is ineffective, we have only two options left:

- Dictionary attack with mutations. Assuming the password is a word, a group of words or modified words (password -> p@$$w0rd), our software can attack the password using mutations in the specified dictionaries. Here is a video example - https://youtu.be/GIYLN1Uy8_M

- Extended mask attack. If you know at least something about the password structure you can try to compose a complex mask. In our software you can specify even such exotic rules as: the first symbol in the password is a capital letter, the second is a number only, then we’ve got a line of letters, and in the end – a number and a special character (P4hdJfy9!). That is a real-world example, by the way - https://passcovery.com/helpdesk/knowledgebase.php?article=53

Anyway, the fellow is hardly going to get his ‘free’ exam, but he never knows about it, because goddamn Reddit removed my comment. ;)

PS: Oh, of course, there’s always a possibility, that the password was set by a clueless idiot who managed to come to a ‘brilliant’ password 12345
1
1
Add a comment...
 
 
We received a feedback from Germany (see below). I'd like to mention the most evident things:

1. files are removed from the server
2. nobody reads information contained in files

In case of payment for decryption, files are removed in a day after sending them to the user and files that are abandoned (unpaid) are removed in 7 days.

"Thank you from the bottom of my heart, indeed. File arrived, and after 12 years it is most interesting to read again. The only document I ever had password-protected...

It is, by the way, my fearless, searching moral inventory as suggested by Step 4 in AA. I trust that you have your copy deleted by now. If not - well, no harm is done if anybody reads it after all this time. It could even be something my Higher Power has arranged, there may be reasons.

Your service is most helpful and I will surely recommend it.
W. Welzin
Best regards from Hamburg/Germany"

You can find more feedbacks and guaranteed decryption of password-protected documents created in
Excel/Word 97-2003 on AccessBack.com 
Passcovery’s unique rainbow tables guarantee 100% success! Removes passwords of any length or complexity. No software to install.
View original post
1
Add a comment...
 
+Passcovery. Just solve the lost password problem announces the release of #AccentRPR, 3.51, a program to quickly restore RAR3/RAR5 password on AMD/NVIDIA video cards.

The program features improved work with complex dictionaries and offers better user experience.
 
As you might know, Passcovery programs sport excellent dictionary attack. Our software can do some crazy stuff with dictionaries, in fact almost anything you can imagine: merge dictionaries, alter case of characters, replace symbols or interchange them and many more. Watch examples on our YouTube channel

The 3.51 update of #AccentRPR brings in even better work with dictionaries. We have fixed indexing of dictionaries with “words” ranging from 256 to 1024 symbols long.

Also, the recovered #RARpassword cache stays visible even after the password protect file is removed form the disk.

Demo versions of our tools for quick recovery of passwords are available at the Passcovery website: http://passwordrecoverytools.com/download.asp
View original post
1
Add a comment...
Contact Information
Contact info
Email
Story
Tagline
Professional password recovery for Office/Zip/Rar files
Introduction
We supplies high-speed, professional software solutions for recovering lost passwords. The first versions of these solutions were released in 1999. Today, our software is successfully used by law enforcement, government agencies, corporations and private individuals around the world.