PwlTool
v4.0

password recovery tools for MS Windows 95/98

(c) 1998 Vitas Ramanchauskas & Eugene Korolev, vitas@webdon.com, v-t-s@usa.net

HOME   RePwl   Vitas' site   License   Register now   TechNotes   Setup    FAQ   Bug Report

Estimate your chance

This page based on the information from my site. Visit it for full and up to date version.

If the password protection system you use had been designed properly (as in case with MS Windows OSR2) the only way of password recovery is searching all passwords (although this search may be quite intelligent - read further about this). For a password search it is important to know how many passwords are possible and what is the search speed. The quantity of password variants equals to N^M, where N is the quantity of characters in a charset (i.e., the quantity of characters that may be virtually present in a password) and M is the length of a password. By dividing this number by the speed of a search we obtain the T - the time for a complete search, that is, in the 'worst case' the time we have to wait to get a password. In the 'best case' the very first password will be the right one. The probability to find a password during the time of t equals to p=t/T, for example, a probability to find the password during the half of time indicated equals to 50%.

A password usually only contains letters. In this case the quantity of characters in a charset is 26 (Windows converts passwords to upper case). The following table will help you estimate what the aforementioned formulas actually mean.

The password search time with respect to the password and charset size. The search speed is supposed equal to 50,000 passwords per second (Pentium-200).

psw length / charset

26 (letters only)

36 (letters & digits)

70 (all printable)

4

instantly

instantly

8 minutes

5

4 minutes

20 minutes

9 hours

6

100 minutes

12 hours

27 days

7

45 hours

18 days

5 years

8

24 days

21 months

371 years

9

48 days

65 years

26,000 years

Nevertheless, things don't look so bleak for you. The point is that passwords are made up by living people, and many people are alike. Therefore people use some words more frequently than others. There exist frequency dictionaries that list the most popular words. Good dictionaries contain hundreds thousand words. Almost for sure, any word you can come up with is contained in such dictionaries. Even if you take a professional term as a password, it can still be contained in a dictionary. Try to use a dictionary!

Another way is to use 'smart force attack' instead of brute force. This technology is under development. You can find more details about it on my site. It will be included into future releases of the program. All registered users will receive this update for free!