Passcovery. Just solve a lost password problem > Help Desk > Knowledgebase

Batch Password Recovery In Passcovery Apps

Rating (Votes): Article rated 5.0/5.0 (2)

Sometimes we may need to recover more than one password at the same time. One of our users is having a tough time recovering his 5 rar files. In this video you’ll see how to pull this off.

In this case we will demonstrate how to configure batch recovery of passwords using Accent RAR Password Recovery – our program for searching RAR passwords. You will learn how to get the same (or even better!) results while recovering passwords with any other Passcovery program. All our tools have the same interface.

Should you have any problem or questions, or no problem at all and you feel super satisfied, please like the video and write a comment or a message to our help desk. We will reply as soon as possible.

Now let's go!

So what we have is 5 rar files and a dictionary. With the help of the program I will consecutively check all passwords from the dictionary for all the five files (it may not only be dictionary attacks, of course, other attacks are also possible).

I will use Windows batch file (cmd file) repeatedly execute AccentRAR for each rar file located in the folder. The attack scenario with a specific rar file name will be linked up to AccentRAR. As soon as the program completes all the attacks described in the scenario for the file, it will close, and Windows will restart the cycle for the next rar-file.

Passcovery programs support various attack scenarios. You can configure as many attacks as you need. The program will work according to the given scenario by launching attacks one after another until it finds the password or completes the entire scenario. That is how you can launch a password attack on all fronts.

Now let us start our real-time step-by-step guide.

Batch Recovery of Multiple Passwords

Step 1. Create a new folder with all the files and the dictionary. My folder path is "C:\Passcovery\". The rar-files and dictionary dict.txt are in the folder.

Step 2. Create a scenario with a list of required password attacks and save it in the same folder.

I have created a text Unicode file "scenario.txt". The file contains three lines:

  • scenario name (1)
  • file format to which the scenario can be applied (2)
  • attack description (3):

    /a:d /d:"C:\\Passcovery\\dict.txt" — that stands for a dictionary attack (/a:d) with the specified dictionary name and location (/d:"dictionary file path, enclosed in quotes" (Important: double backslash designates nesting levels of folders))

You can configure more and completely different attacks. All you need to do is describe each attack in a separate line. The program will apply all of them one by one for each file.

For more details on creating scenarios, see our help file about Passcovery tools.

Please note: our programs can only read scenarios in Unicode format. We recommend to use Windows Notepad to edit and save files. This program is available in your Windows system and it is enough to complete the task.

Step 3. Create a .cmd file for cyclic execution of Passcovery and save it to the project folder.

In this example it is a regular text file cmd.cmd with a single command:

FOR /R %%G IN (*.rar) DO "C:\Program Files\Passcovery\Accent RAR Password Recovery\AccentRPR_x64.exe" /sc:"scenario.txt" /ewd "%%G"

The cyclic command FOR /R %%G IN (*.rar) DO AccentRPR_x64.exe %%G will find all the rar-files in the current folder and execute AccentRAR with the given parameters for each of the files.

Make sure you specify full path to the program file. The qualifier /sc links up the scenario created in the previous step, and /ewd closes the program when the attack is completed and restarts the program to process the next rar file.

Now that I can start batch recovery of passwords, let us see what I have got in the project folder:

That is how it is supposed to look:

  • one batch file (.cmd file) (1)
  • one scenario file (2)
  • dictionary file(s) (if you choose dictionary attack) (3)
  • password protected files (4)

Step 4. Run the batch file (.cmd file) with a double click as you usually do with regular program files.

And let the magic begin! ッ

I see AccentRAR starting with a rar-file from the folder, successful recovery of one file and failed dictionary attack of another. I see other files processed until they are all done.

Step 5. You can view the results of batch recovery in AccentRAR or in any text editor. The results are saved as a separate txt file in the source folder.

Here is what I got:

The program consecutively worked through all the rar-files, completed the attacks from the scenario and found passwords where it was possible with the given attacks. Now you can remove the files with recovered passwords from the project, change the attack scenario and repeat the search.

That is how it works.

Question and Answer

Question: How do I batch process five files with a dictionary attack with mutations? For example:


Answer: That will not be much harder. First, you need to create a file with mutation rules (for example, rules.txt). It is recommended to use the Rules Editor:

Then describe the attack in the scenario file and specify the path to the rules and dictionary. Like this (I am using the paths from the example above):

/a:r /r:"C:\\Passcovery\\rules.txt" /d:"C:\\Passcovery\\dict.txt"


Question: How can I do a brute force with a charset of all digits and/or all letters?

Answer: If you need a simple brute force attack, this is how you describe it in the scenario:

/a:b /c:sd /min:3 /max:5

/a:b – brute force attack
/c:sd – low-case letters and digits
/min:3 – minimum length
/max:5 – maximum length


Question: How do I specify in the scenario an extended mask if the first character is from the charset "QWER", the next 4 characters are from the charset "asdfghjkl;", and the last one is a digit?

Answer: In this case, you need to describe your custom charsets and then configure the mask. Like this:

/a:m /c: /1:QWER /2:asdfghjkl; /m:?1?2?2?2?2?d

/a:m – extended mask attack
/c: /1:QWER /2:asdfghjkl; – description of the first and second charsets
/m:?1?2?2?2?2?d – mask based on custom charsets defined by user: charset 1 corresponds to position 1, charset 2 – the next four positions, and one digit (0-9) at the end

Read more about the use of extended masks in this article.


See more details about the types of attacks and additional elements in scenarios in the help file and online manual.

Then go to Step 4 — run the command file with the required attack scenario.


Passcovery Programs for Password Recovery

AccentOPR Logo Accent OFFICE Password Recovery
for Microsoft Office/OpenOffice (with GPU-acceleration on AMD/NVIDIA video cards)
Download x86
(9624 Kb)
Download x64
(11408 Kb)
AccentPPR Logo Accent PDF Password Recovery
for Adobe PDF
Download x86
(7332 Kb)
Download x64
(8552 Kb)
AccentZPR Logo Accent ZIP Password Recovery
for Zip/WinZip (with GPU acceleration)
Download x86
(7676 Kb)
Download x64
(9068 Kb)
AccentRPR Logo Accent RAR Password Recovery
for Rar/WinRar (with GPU acceleration)
Download x86
(13420 Kb)
Download x64
(14440 Kb)
Passcovery Suite Logo Passcovery Suite
for Microsoft Office/LibreOffice/OpenOffice, Adobe PDF, Zip/WinZip, Rar/WinRar, TrueCrypt, Apple iOS, BlackBerry OS, WPA/WPA2 (GPU-accelerated)
Download x86
(18912 Kb)
Download x64
(21172 Kb)

Archive with files from the examples in the video (cmd file, scenarios, mutation rules file, dictionary, rar files): zip-archive

* * *

Even though there is no built-in batch mode in Passcovery programs, this method of batch recovery of multiple passwords works perfectly well. It is especially useful when you need to apply the same pattern to several files of the same type.

If you have any questions or comment please share your thoughts below the video or write to our helpdesk. We are always there to help you.

Was this article helpful? YES / NO
Related articles TrueCrypt Password Recovery using Passcovery Suite Command Line
Recovering a password for a TrueCrypt disk
How to Recover an OpenOffice Password with Dictionary Attack

Powered by Help Desk Software HESK, in partnership with SysAid Technologies