Contents


  • Introduction
  • Requirements
  • How to work with the program
    • About Windows passwords
    • How the program works
    • Obtaining password hashes
    • Credentials
    • Password cracking
      • Password cracking methods
      • Dictionary attack
      • Brute-force attack
      • Rainbow attack
      • Recovery process and results
    • Reports
    • Program options
  • Technical support
    • Contacting us
    • Where to get the latest version
  • License and registration
    • Copyright and license
    • Registration
    • Limitations of unregistered version