Wireless Password Recovery

Wireless Password Recovery

Wireless Password Recovery retrieves passwords for wireless networks
4.1  (16 votes)
2.7
Check the report.

Wireless Password Recovery can help you assess the security of wireless networks and retrieve passwords. Due to the complexity of these types of operations, the utility may seem difficult to use for inexpert users at first. In spite of this, its interface is rather straightforward. Besides, its design is very similar to that of Microsoft Office products, which definitely helps flattening its learning curve. It can also be customized with various themes.

The tool has a series of features that allow recovering passwords. Besides, it supports different types of password-recovery methods. From the group of the so-called smart attacks, which are supposed to be faster, you can choose from Preliminary, Artificial Intelligence and Fingerprint. There´s also another group comprising common attacks, such as Brute Force, Dictionary and Mask. A third group is made up of advanced attacks, including Base Word, Combined Dictionary, Phrase Attack and Hybrid Dictionary. Finally, you can also use Batch Attack, which is a user-defined combination of some of the above mentioned methods.

Recovering passwords can take a lot of time using the hardware resources available from a standard machine. Luckily, this application can exploit all your computer´s potential as it can make use of not only your CPU but also your GPU to shorten the waiting time.

In general, Wireless Password Recovery is not intended for home users. Instead, it is for security auditors, network administrators and data forensics experts who can benefit the most from its use. If you have difficulties to use it at first, it´s logical. However, I’m sure you’ll overcome them with the help of the accompanying help files. Regrettably, I must say that they contain some typos, and some pages have not been edited well because they are written in Latin.

Pedro Castro
Editor rating:

Review summary

Pros

  • It uses several types of password-recovery attacks, some of them unique.
  • It can use all your computer’s processing power.
  • It lets you create advanced audit reports.
  • On-the-fly decryption of hashes

Cons

  • It is difficult to use at first.
  • Its help files need revising

Related stories

See all
Soon you can play PC games with an Xbox wireless controller
Soon you can play PC games with an Xbox wireless controller
How to fix Windows 10-related WiFi problems
How to fix Windows 10-related WiFi problems
How to a create a USB recovery drive for Windows 10
How to a create a USB recovery drive for Windows 10
The best free WiFi analyzing tools for Windows 10
The best free WiFi analyzing tools for Windows 10
5 companies working on wireless hi-end VR solutions
5 companies working on wireless hi-end VR solutions

SI comments

Thank you for rating the program!
Please add a comment explaining the reasoning behind your vote.
0 comments
Your vote:

Facebook comments

Latest stories

See all
Reading thoughts, hearing with skin and more Facebook fun
Reading thoughts, hearing with skin and more Facebook fun
Check out Ancestors: The Humankind Odyssey's first trailer
Check out Ancestors: The Humankind Odyssey's first trailer
Install MacOS on PC
Install MacOS on PC
Windows Insider introduces a Power Throttling feature
Windows Insider introduces a Power Throttling feature
Spaces, Facebook's VR social network, is now in open beta
Spaces, Facebook's VR social network, is now in open beta
Info updated on: