How to Recover Password for PDF?
Have you felt bad that you’ve forgotten the password to your PDF document? If the document is important, you need to access it but you can’t. How frustrating it feels! Then you’ll find that PDF Password Recovery software is something that is vital.
With Adobe PDF password recovery software you don’t have to worry about this anymore.
If you are in trouble with the Forgotten Adobe PDF Password, just benefit from the free trial version of PDF Password Recovery 5.0
PDF Password Recovery is easy to use with the clean design and clear instructions. The Menu
like all other software is a list of options available to you. For File Name, click "Open"
immediately after to enter the full path of the PDF document into the program. In the middle is the Attack Types and Settings, three attack types for you to select and the settings to each attack. Log Window is to record for events at a specific time and the Process is a process indicator with
Current Password and Current Speed showing you the data during the program is processsing
for the password. Once you get used to the program, it's going to be the ever easiest for you not
only to manipulate it but to make full use of it to recover the password in the shortest time!
Step1. Import the encrypted PDF file into the program
Open the program, click "File > Open", or the "Open" tab to import the file into the
In the "Open" popup, select the file and click "Open".
Step2. Select an attack type
PDF Password Recovery provides three types of password attacks, which are for
different uses based on different password situations, such as the password length,
complexity, etc. Under "Recovery", select an attack type according to your situation. ; Brute-force Attack: The program will try all possible character combinations
randomly. If you can't remember anything about the password, like its length,
possible characters it contains, frequently used character set for your password.
Then use this attack, however, this attack may consume relatively longer time
than that when using the other two types.
; Brute-force with Mask Attack: You can use this attack if you still remember
part of your password. For example, if you still remember your password is 4
characters and begins with "z", then you can define the mask as "z???". This
reduces the work for the program, as it will seek for the last 3 characters of the
password instead of 4 characters of the whole. To use this attack, a Password
Mask is must defined.
; Dictionary Attack: This attack is highly recommended. If use properly, it is
the fastest when compared with the above two attacks. This attack is intended
to seek the possible password based on a dictionary. This dictionary can be the
integrated one or the one you provide. The integrated dictionary is a text file
listing common character combinations, such as a, ab, 123, 4, AB, etc. that
people may frequently use for passwords. You can also create a dictionary by
listing your character sets that you frequently use to let the program base on
when seeking passwords. If so, the seeking scope is largely reduced and it is
bound to save time for the process.
Under "Recovery", select an attack type that suits you mostly:
; "Brute-force Attack (Trying All Possible Combinations)", if with no
; Burte-force with Mask Attack (If Some Password Symbols are known), if
you still remember part of the password.
; Dictionary Attack (Recommended), if the password is frequently used or
you can provide a dictionary file.
Step3. Type of Attack Settings
1. If Brute-force Attack is selected, settings under "Brute-force" and "Dictionary"
are grayed. It's no need for you to set. Please refer to "Option settings" below to see
the detailed information on the settings under "Option".
2. If Brute-force with Mask Attack is selected, please do the following settings. Under "Brute-force", set the possible length for the password with "Min Length"
and "Max Length". Define the possible password character settings with "Character
; a-z: refers to the 26 small letters, abcdefghigklmnopqrstuvwxyz. If there is
small letter in the password, check the box.
; 0-9: refers to the ten digits, 0123456789. If there is digit in the password,
check the box.
; A-Z: refers to the 26 letters in upper case,
ABCDEFGHIGKLMNOPQRSTUVWXYZ. If there is upper letter in the
password, check the box.
; -_!@#$%^&*: refers to special characters. If there is special character in the
password, check the box.
; Custom Character Set: this is to let you enter the symbols that the ranges
above do not include.
; Check the box of "Prefix", if you still remember the first character of the
password and type it in the box immediately after.
; Check the box of "Suffix", if you still remember the last character of the
password and type it in the box immediately after.
Please refer to "Option settings" below to see the detailed information on the settings under "Option".
3. If Dictionary Attack is selected, please do the settings below.
; If you want more character combinations, please check "Smart Mutations".
Choose a number for "Mutation Count", and select a number in the "Max
Password Length" for the possible maximum length of your password.
; The program provides a default dictionary, which lists common character
combinations for passwords in line. If want to use the default dictionary, then
leave it as default. If you want to use your own dictionary, which is closer to
the possible password, then create a text file, list in line the possible characters
and character sets that may be included in the password, and then select the
file as the dictionary for the program with "Select Dictionary File…" Please
refer to "Option settings" below to see the detailed information on the settings
Step4. Option settings
Under "Option", there is Program Priority and General Options:
Program Priority: Changing Program Priority allows you to control the allocation
of processing resources on your computer. A multi-tasking operating system such as Windows, allows you to run multiple programs simultaneously, but most computers have only one central processor. This means the OS must divide the total amount of work, and the processor must perform between those programs. While each application has a priority that is automatically determined by the OS, the default allocation of resources among running tasks doesn't always provide maximum system productivity. So you may set the program priority for a preferred system productivity.
; Idle: A computer processor is described as idle when it is not being used by
any program. If you choose Idle here, it means the processor will only
perform PDF Password Recovery.
; High: While the computer processor is performing multiple programs
simultaneously, if you set the PDF Password Recovery as High, it indicates
the processor will allocate more processing resources to it. This will definitely
increase its performance. However, in this case, other programs on the system
won't receive an appropriate share of processing resource, which may reduce
; Auto-save (min): If it is enabled, while the program is processing, it will save
the project every a period of time. If you set it as 15 minutes, then the program
will automatically save the process every 15 minutes. Check the box
"Shutdown the Computer after Cracking Finishes", if you want to close the
computer after the cracking is finished.
Step5. Start the attack
Click "Start" to start the attack. This may take several minutes.
When the attack finishes, a window will pop up to you, telling the opening password in "File Opening Password".
Copy and paste the password in the box below to open the file. If want to open and edit the file, click "Remove all passwords from the File". Click "OK" to finish the
Keyword: PDF password recovery, reset PDF password, forgot password