The Attack Settings Editor provides control over the password recovery process. You can add, remove, and combine password recovery attacks there.
Starting the Attack Settings Editor
- Launch Passware Kit.
- On the Start Page, click Recover File Password (or press Ctrl+O/Cmd+O) and choose the protected file that you want to unlock. Click Open. Alternatively, drag-and-drop the file in question to the Start Page.
- A screen with three options is displayed: Passware Kit Wizard, Predefined Settings, and Customize Settings.
- Choose the Customize Settings option.
NOTE: In batch mode, click on the Attack Settings link next to the Group name.
The Attack Settings Editor window displays the list of password recovery attacks (predefined attacks by default) and a panel with actions at the bottom.
The following columns are present:
- Settings (casing, modifiers, characters, Xieve™ level)
- Passwords to check
- Configure icon
Once the setup is complete, start the attacks by clicking the Recover button on the bottom right.
Working with Attack Settings Editor
- Adding attack
- Removing attack
- Rearranging and copying attacks
- Saving and loading the attack list
- Resetting to the default settings
- Sorting attacks in the attack list
To add an attack to the attack list, use one of the following methods:
- Click + on the bottom pane.
- Click + inside the group of attacks, (i.e., Join Attack)
Choose the required attack from the list of available attacks and customize its settings. Click the Add Attack button. The attack is added to the attack list.
To remove an attack from the attack list, select the attack and use one of the following methods:
- Click the Remove ("trash bin" icon) button at the bottom of the Attack Settings Editor window.
- Press Del on the keyboard.
- Right-click on the attack, then click Remove from the menu.
You can remove multiple or all attacks from the attack list by selecting all required attacks while holding the Shift button, and then choosing the Remove option from the right-click menu.
Alternatively, click the All button (at the bottom of the window) to clear the attack list.
Rearranging and Copying Attacks
- Move: change the order of the attacks in the list.
To move an attack, select it and drag it to its new location in the list or right-click on the attack, and then click either Move Up/Move Down to move the attack one level up/down or Move to Top/Move to Bottom to relocate the attack to the beginning or the end of the list.
- Copy: duplicate an attack in another location in the list.
To copy an attack or group of attacks into a different position in the list, follow these steps:
- Right-click on the attack you wish to copy and select Copy from the menu.
- Right-click on the attack after which you want to insert the copied attack.
- Click Paste from the menu.
NOTE: The Cut option removes the copied attack from its original position.
Saving and Loading the Attack List
Saving the Attack List:
You can export the configuration of the selected password recovery attacks as a PWM file, which can be used by this or other instances of Passware Kit. Click the Save… button at the bottom pane and choose the location to save the PWM file. The current attack list and settings will be saved on your computer as Passware attacks model (MyModel.pwm by default).
Loading the Attack List:
You can import the password recovery attacks from the existing PWM file created by Passware Kit. Click the Load… button at the bottom pane, then specify whether to Add the imported attacks from the PWM file to the current attack list, or fully Overwrite current attacks with the new list. Then browse for the PWM file to load the attack list.
NOTE: To run the attack list that includes custom dictionaries in another Passware Kit instance, make sure these dictionaries are present in the same location.
Resetting to the Default Settings
To set back the Attack Settings Editor to its Predefined state, click Reset to Default at the bottom pane of the Attack Settings Editor window. All the existing attacks will be overwritten by the default attack list.
Sorting Attacks in the Attack List
Some attacks take more time to complete than others. To run the attacks in the order of their duration, from shortest to longest, click the Sort by Duration button at the bottom pane of the Attack Settings Editor window.