ACCDB Password Recovery
- ACCDB Password by Thegrideon Software is a feature-rich and highly-optimized password recovery tool for MS Access 2007 - 2016 databases (*.accdb, *.accde, ...).
- It works with strong encryption methods: CryptoAPI (2007) and PBKDF2/AES (2010 - 2016).
- Password recovery basics are covered in Password Search FAQ.
- You may also check other Access tools for data and VBA source recovery, mdb tools, etc.
ACCDB Password Recovery Features:
- Several attacks can be configured and queued:
- advanced mixed attacks for precise search range setup:
- multi-position modifications to cover modern password policies;
- simple modifications: add part(s) copy, add reversed copy, etc.
- typing errors generation;
- brute-force attacks based on a charset and length selected:
- optional limit on a number of equal chars;
- number ranges (e.g. 1-31, 1-12, 2003-2018, etc.);
- dictionary attacks with modifications (several wordlists are included):
- password in reverse, capitalized, uppercased, lowercased;
- adjustable mixed-case mode;
- preset or custom char replacements: Aa with @, Zz with 2, Bb with 8, etc.
- advanced keyboard layouts-aware recovery technique;
- "Save passwords to a file" option to verify search settings, generate new wordlist, etc.
- Highly optimized code (SSE, AVX, AVX2) guarantees best performance.
- Utilizes NVIDIA and AMD Graphics processing units with a high-performance methods.
- Utilizes integrated GPUs as well.
- Supports up to 64 simultaneous processing threads (multi-CPU, multi-GPU).
- Audio, script or web address based post-search notification.
- All MS Access 2007 - 2016 encryption methods are supported.
- Windows 7 - Windows 10.
Encryption methods used in Access 2007 are not very strong by today standards and there is a way to replace database password with guarantee (please check Access 2007 Password), however there is no way to recover the original password without exhaustive password search and if the password is as important as database content than ACCDB Password allows you to search through millions of passwords per second.
Password verification methods used in MS Access 2010 - 2016 are based on industry strong encryption and hashing algorithms (SHA-1, SHA-512, AES) and instant password recovery or decryption cannot be guaranteed in contrast to prior MS Access versions. Moreover recovery speed is limited due to iterative methods used in password verification.
In order to recover these types of passwords, candidates have to be created based on dictionary, sequentially with a charset and length selected or as a combination of dictionary, sequential and fixed parts. ACCDB Password allows you to set several attacks in queue, split password in parts and set each part independently with precise search range control. Additional modifications are available including unique keyboard layouts-aware recovery technique, multi-position modification, char replacement (e.g. Z or z with 2), etc.
We did our best to enhance this tool performance as well as the recovery speed with some advanced methods and it found to be the fastest tool for .accdb database password recovery. Password recovery speed for very common hardware is available below to back this statement up.
The final password recovery speed is equal to CPUspeed + GPU(1)speed + ... + GPU(N)speed.
Access 2010 example: Intel i3 + integrated HD 4400 GPU + AMD R9 280X = 1 000 + 400 + 24 600 = ~26 000 p/s (passwords per second).
|Intel® Core™2 Duo
T7500 @ 2.20GHz
|Intel® Core™ i3
2100 @ 3.10GHz
|Intel® Core™ i7
2600 @ 3.40GHz
|Intel® Core™ i3
4130 @ 3.40GHz
|~3 000 000 p/s||~6 000 000 p/s||~12 000 000 p/s||~7 500 000 p/s|
|~230 p/s||~475 p/s||~1 000 p/s||~1 060 p/s|
|~30 p/s||~60 p/s||~130 p/s||~135 p/s|
Modern integrated GPUs (like Intel HD and Iris Graphics) can be used for password recovery acceleration. Integrated GPUs are not as powerful as dedicated (discrete) devices and often overlooked but can add up to 30% to CPU performance.
Compute units or stream multiprocessors (CU, SM, SMX, SMM) are the main building blocks of GPU calculation power, thus 32xCU GPU card is almost 2 times faster than 16xCU GPU card of the same family and architecture running on the same frequency.
For cards with compute capability sm_35 (Kepler 2.0) and above (Maxwell, Pascal, Volta) you can expect approximately 1200 p/s per every SM running at 1000Mhz for Access 2010 and 160 p/s per SM for Access 2013-2016. Test results below are shown to be very close to this estimation.
|+ NVIDIA GPU:|
|GTX 470 (sm_20)
14xSM, 625 MHz
|GT 640 (sm_35)
2xSMX, 1046 MHz
|Tesla K80 (sm_37)
2x13xSMX, 876 MHz
|Tesla V100 (sm_70)
80xSM, 1246 Mhz
|+ 5 200 p/s||+ 2 850 p/s||+ 27 200 p/s||+ 120 000 p/s|
|+ 710 p/s||+ 340 p/s||+ 3 300 p/s||+ 18 000 p/s|
AMD GPUs are very "password recovery friendly" and consistent with architecture change from VLIW5 to VLIW4 and now to GCN. You can expect approximately 750 p/s per every CU running at 1000Mhz for Access 2010 and 130 p/s per CU for Access 2013-2016.
|+ AMD GPU:|
10xCU, 850 Mhz
20xCU, 925 MHz
36xCU, 1266 MHz
|+ 7 800 p/s||+ 13 800 p/s||+ 37 000 p/s|
|+ 760 p/s||+ 2 400 p/s||+ 6 400 p/s|
It is important to mention that AMD and NVIDIA architectures are quite different and although AMD per CU performance is lower, there are more CUs per card in a similar price range. Moreover GPU performance is somewhat variable with number of factors including GPU/CPU combination and even a driver version. Please contact us if your recovery speed is noticeable different from the data above.
Trial version allows you to setup and test run any password search for up to 15 min per run. Recovered passwords are hidden behind the asterisks "***".