Our daily work can’t be done without documents and files. And there will be no data safety for document/files without password. While, where there is password, there is password forgotten/lost. So you need to recover the password. The thing you need to know is that it will be very difficult even impossible to recover password without password recovery programs. However, many people spent hours, days, even longer time while using password recovery programs to find a lost password. It’s because they didn’t pick the right way.
Now this article details how to use Dictionay and Mask password attack to recover password for Office, RAR, ZIP, PDF, iTunes .etc documents/files with iSumsoft password refixer program – Office/RAR/ZIP/PDF Password Refixer. And knowing the following two kinds of password attack ways will help you recover password more quickly.
Dictionary Attack means you save all the possible passwords in a text file, then the password recovery program will look for the password from the text file (dictionary) one by one until it finds your password. In this way, you won’t need to manually type the passwords one by one to try to open the password protected document/file. To use Dictionary Attack, the most critical point is to create a powerful password library.
The following methods will help you quickly create a more powerful dictionary.
Method 1: Use frequently used passwords to create a dictionary. The following are some more commonly used passwords.
For example, 123456, 1234, 111111, 000000, 999999, 123456789, 1234567890, abc123, 123abc, 123123, password, qwerty, iloveyou, 1234567, adobe123, admin, letmein, sunshine, 9876543210, password123, shadow, monkey, admin123, ABC123, ABCabc .etc.
Method 2: Create a dictionary by using old passwords, that is, the passwords you ever used.
Method 3: Use some special character strings to create a dictionary. Such as your birthday, name, name + birthday, phone number, doorplate number, some special dates, the pet’s name. And these information of your family members can be use for dictionary attact.
Step 1: Save all the character strings which may be your password in a text file, and only one string in each line.
Step 2: In the password recovery program select Dictionary Attack type.
Step 3: Load your dictionary into the program.
Select the Dictionary tab and click Select Dictionary button, then navigate to the path to your created dictionary text file and load it into the program.
Step 4: Start to crack password.
Password recovery by features means that you know the features of the password and you can set up the password recovery program according to the password features, then the program will crack password according to your settings. The more detailed you make the password features the better for the program to crack password. In order to prevent from a very long wait while cracking password, you are recommended to carefully read this part and then carefully set the password features in the password recovery program.
Tips: Password recovery by Mask is usually applied to Brute-force attack and Mask attack.
What password features do you know?
1. Password length.
If you know exactly how many numbers in the passcode, or presumably know how many numbers in the password, then please be sure to set the password length. For example, if you know the password length is 8, please set the both the Minimal password length and Maximal password length to 8.
2. Know some parts of the password. (For example you know the first few characters or the last few characters of the password. )
Example 1: If you know the password’s first three characters are "abc", but have no idea the rest, then you can write abc in the Start from box.
Example 2: If you know the password’s first three characters are "abc", the last two characters are "20" and have no idea the middle part, then you can put abc in the Start from box and put 20 in the End at box.
Example 3: If you know the password is eight characters long and the first four characters are "jhon", then you can set the minimal password length and maximal password length are 8. And set the Mask as "jhon????". So the password recovery program will help you quickly find the four remaining characters.
3. Know exactly what characters the password consists of, but have no idea the sequence of the characters. For example, you can remember your password consists of "abc123" but have no idea the exact sequence, and have no idea the total number of the characters, then you can check the User-defined and write "abc123" in the box. Then the password recovery program will find your password from the defined characters.
4. Know what characters the password contains and doesn’t contain.
Example 1: If you know the password only contains digits, please check All-digits(0~9) and uncheck the other character set options.
Example 2: If the password only contains lowercase letters, then check All small latin(a~z) and uncheck the other options.
Example 3: If the password only consists of capital letters, then check All caps latin and uncheck the other options.
Tips: Both the above two password recovery methods are imposed on local passwords for Office/RAR/ZIP/PDF/iTunes documents/files.
1. Online password
An online password is a password which is encrypted and stored in the remoter server. Your entered password will be transmitted to the remote server through Intelnet. After comparison the server will return the results whether your entered password is correct or not. For example, the common online passwords are Google accounts passwords, apple accounts passwords, facebook accounts passwords, your bankcard password .etc.
2. Local password
The local password means that the encrypted password will be stored on your computer, mobile or other local devices. When you enter the password, the password recovery program will compare your entered password to the local password and then give the results whether your entered password is correct or not. The clear difference between the online password and local password is that the former requires network transmission and the latter doesn’t require any network transmission.