How long does it normally take to recover a password?
Passwords that cannot be recovered or reset instantly (for example, file-open passwords for Rar, Zip, Word and Excel 2007, MS Money, Lotus Notes) are searched by basic Dictionary, Xieve, Brute-force, and Previous Passwords attacks. It may take from a few minutes up to several days to find a password, depending on the file type, and the password length and symbol set.
For example, it usually takes 10 hours to check all 8-letter file-open passwords from Word/Excel 2003 on an average Intel Core Duo system processing 1,000,000 passwords per second.
You can significantly reduce time needed to recover a password by using patterns if any part of the password is known. Just enter this part in the Pattern field at Brute-force Attack Settings -> Advanced -> Pattern. Known parts can be separated with '*' or '?'. For example, pattern "*p?e*" will match both "apple" and "pie". You can also specify the known part by joining the Known Password/Part attack with other attacks. For example, if you know your password is a word followed by "1980", use Join Attacks to combine a Dictionary attack and a Known Password/Part attack with the value set to "1980".
To accelerate the password recovery process, also try changing other settings: range of password length, symbol set, etc.
Passware Kit uses advanced hardware acceleration methods: nVidia GPU cards, multiple-CPUs, Tableau TACC hardware accelerators, and Distributed Password Recovery.
For MS Word and Excel 95 - 2003 files, use the Decryptum attack to preview and decrypt your files instantly. WithDecryptum, it takes less than a minute to decrypt any MS Word/Excel file, regardless of the password length.