Elcomsoft
558 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
Elcomsoft System Recovery adds BitLocker support

We updated Elcomsoft System Recovery, a Windows PE-based tool to recover or reset passwords to local Windows accounts and Microsoft accounts in all versions of Windows. The tool adds native support for BitLocker volumes, enabling users to mount BitLocker-encrypted partitions using one of the three supported disk protectors.

📝 Release Notes

👉 https://www.elcomsoft.com/news/752.html

#bitlocker #password #recoverykey #usbkey #boot #encryption #fde #cybersecurity #itsecurity #computerforensics
Breaking LUKS Encryption

LUKS encryption is widely used in various Linux distributions to protect disks and create encrypted containers. Being a platform-independent, open-source specification, LUKS can be viewed as an exemplary implementation of disk encryption. Offering the choice of multiple encryption algorithms, several modes of encryption and several hash functions to choose from, LUKS is one of the tougher disk encryption systems to break.

Learn how to deal with LUKS encryption in Windows and how to break in with distributed password attacks:

👉 https://blog.elcomsoft.com/2020/08/breaking-luks-encryption/

#LUKS #Linux #fde #passwords #passwordrecovery #encryption
It’s Hashed, Not Encrypted

How many times have you seen the phrase: “Your password is securely encrypted”? More often than not, taking it at face value has little sense. Encryption means the data (such as the password) can be decrypted if you have the right key. Most passwords, however, cannot be decrypted since they weren’t encrypted in the first place. Instead, one might be able to recover them by running a lengthy attack. Let’s talk about the differences between encryption and hashing and discuss why some passwords are so much tougher to break.

👉 https://blog.elcomsoft.com/2020/09/its-hashed-not-encrypted/

#passwords #passwordsecurity #itsecurity #encryption #hashingpasswords #saltedhash
Ruling Out the Encryption

We all have habits. Morning coffee (no sugar, just some milk), two eggs (sunny side up), reading mail wile you are not completely awaken, and a lot more. We all follow some kind of rules we have set for ourselves. We all have some favorites: names, cities and even numbers; maybe an important date or place. Can we exploit people’s habits to break their passwords effectively instead of using brute force? We can, and here’s the how-to.

👉 https://blog.elcomsoft.com/2020/10/ruling-out-the-encryption/

#encryption #GPU #password
May the [Brute] Force Be with You!

Remember the good old times when there was a lot of applications with “snake oil” encryption? You know, the kind of “peace of mind” protection that allowed recovering or removing the original plaintext password instantly? It is still the case for a few “we-don’t-care” apps such as QuickBooks 2021, but all of the better tools can no longer be cracked that easily. Let’s review some password recovery strategies used in our software today.

👉 https://blog.elcomsoft.com/2020/10/may-the-brute-force-be-with-you/

#passwordcracking #passwords #bruteforce #encryption
Elcomsoft vs. Hashcat Part 1: Hardware Acceleration, Supported Formats and Initial Configuration

Hashcat is a great, free tool competing head to head with the tools we make. We charge several hundred dollars for what, in the end, can be done with a free tool. What are the reasons for our customers to choose ElcomSoft products instead of Hashcat, and is the expense justified? We did our best to compare the two tools to help you make the informed decision.

👉 https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-part-1-hardware-acceleration-supported-formats-and-initial-configuration/

#encryption #passwords #gpucomputing #hashcat #bruteforce
Elcomsoft System Recovery update: a Swiss army knife in desktop forensics

We updated Elcomsoft System Recovery, a Windows PE-based tool to recover or reset passwords to local Windows accounts and Microsoft accounts in all versions of Windows. In this release, we offer more options for recovering the original passwords as opposed to resetting while adding a multitude of other improvements.

👉 https://www.elcomsoft.com/news/772.html

📝 Release Notes (PDF)

#encryption #virtualmachines #diskimage #passwords #dataaccess #passwordrecovery
Forensically Sound Cold System Analysis

As opposed to live system analysis, experts performing the cold analysis are not dealing with authenticated user sessions. Instead, cold analysis can be viewed as an intermediary measure with live system analysis on the one end and the examination of a forensic disk image on another. Why and when would you use cold system analysis, what can you do and what benefits does it bring compared to the traditional approach? Read along to find out.

👉 https://blog.elcomsoft.com/2020/12/forensically-sound-cold-system-analysis/

#dfir #datasecurity #encryption #windows #itsecurity
NAS Forensics: QNAP Encryption Analysis

A year ago, we analyzed the encryption used in Synology NAS devices. We were somewhat disappointed by the company’s choice to rely on a single encryption layer with multiple functional restrictions and security reservations. Today we are publishing the results of our analysis of data encryption used in QNAP devices. Spoiler: it’s very, very different.

👉 https://blog.elcomsoft.com/2020/12/nas-forensics-qnap-encryption-analysis/

#nas #encryption #datasecurity #dataprotection #sedencryption
Understanding BitLocker TPM Protection

Investigating a BitLocker-encrypted hard drive can be challenging, especially if the encryption keys are protected by the computer’s hardware protection, the TPM. In this article, we’ll talk about the protection that TPM chips provide to BitLocker volumes, and discuss vulnerabilities found in today’s TPM modules.

👉 https://blog.elcomsoft.com/2021/01/understanding-bitlocker-tpm-protection/

#tpm #encryption #datasecurity #bitlocker
NAS Forensics: Synology, ASUSTOR, QNAP, TerraMaster and Thecus Encryption Compared

More than a year ago, we started researching the available encryption options in off the shelf network attached storage devices. We started with Synology devices, followed by Asustor, TerraMaster, Thecus, and finally Qnap. The manufacturers exhibit vastly different approaches to data protection, with different limitations, security implications and vulnerabilities. Today we are publishing the aggregate results of our analysis.

👉 https://blog.elcomsoft.com/2021/02/nas-forensics-synology-asustor-qnap-terramaster-and-thecus-encryption-compared/

#asustor #nas #digitalforensics #qnap #synology #terramaster #thecus #encryption
Breaking Jetico BestCrypt

BestCrypt, developed by the Finnish company Jetico, is a cross-platform commercial disk encryption tool. Available for Windows, Linux, macOS and Android platforms, BestCrypt is delivered in two editions, one offering full-disk encryption and the other encrypting virtual disk volumes stored in containers, the latter being supported with our tools.

👉 https://blog.elcomsoft.com/2021/02/breaking-jetico-bestcrypt/

#jetico #bestcrypt #encryption #cybersecurity
Elcomsoft System Recovery update simplifies digital field triage

Elcomsoft System Recovery, a digital field triage tool, receives an update. The tool adds the ability to extract Wi-Fi passwords and helps identify the owner of the computer being examined by extracting its Windows license key. In addition, file system analysis is made easier with an embedded two-panel file manager.

📝 Release notes (PDF)

👉 https://www.elcomsoft.com/news/789.html

#esr #wifipassword #licensekey #dfir #digitalforensics #encryption #windows
NAS Forensics: TrueNAS Encryption Overview

Established NAS manufacturers often offer some kind of encryption to their users. While anyone can use “military-grade AES-256 encryption”, the implementation details vary greatly. Synology, Asustor, and TerraMaster implement folder-based encryption, while QNAP, Thecus, and Asustor (MyAcrhive) employ full-disk encryption; the full comparison is available here. In this article, we’ll have a look at encryption methods used in TrueNAS, a system commonly used by computer enthusiasts for building custom NAS servers.

👉https://blog.elcomsoft.com/2021/08/nas-forensics-truenas-encryption-overview/

#nas #truenas #encryption
Protecting Linux and NAS Devices: LUKS, eCryptFS and Native ZFS Encryption Compared

Many Linux distributions including those used in off the shelf Network Attached Storage (NAS) devices have the ability to protect users’ data with one or more types of encryption. Full-disk and folder-based encryption options are commonly available, each with its own set of pros and contras. The new native ZFS encryption made available in OpenZFS 2.0 is designed to combine the benefits of full-disk and folder-based encryption without the associated drawbacks. In this article, we’ll compare the strengths and weaknesses of LUKS, eCryptFS and ZFS encryption.

👉 https://blog.elcomsoft.com/2021/11/protecting-linux-and-nas-devices-luks-ecryptfs-and-native-zfs-encryption-compared/

#encryption #linux #luks #ecryptfs #nas #zfs
Elcomsoft adds support for BestCrypt Volume Encryption 5

Elcomsoft updates its range of solutions for distributed, hardware-accelerated password recovery and data decryption, adding support for yet another popular full disk encryption product: BestCrypt Volume Encryption.

👉 https://www.elcomsoft.com/news/802.html

#bestcrypt #encryption #edpr #efdd #esr
Targeting Backup Encryption: Acronis, Macrium, and Veeam

Windows backups are rarely targeted during investigations, yet they can be the only available source of evidence if the suspect’s computer is locked and encrypted. There are multiple third-part backup tools for Windows, and most of them have password protection as an option. We are adding the ability to break password protection of popular backup tools: Acronis True Image, Macrium Reflect, and Veeam.

👉🏻 https://blog.elcomsoft.com/2022/01/targeting-backup-encryption-acronis-macrium-and-veeam/

#encryption
Advanced Office Password Recovery: WordPerfect Office and Lotus SmartSuite support

Advanced Office Password Recovery 7.10 gains the ability to unlock protected WordPerfect Office and Lotus SmartSuite documents, offering instant unlock or fast guaranteed timeframe recovery depending on the format.

👉 https://www.elcomsoft.com/news/810.html

📝 Release notes (PDF)

#aopr #wordperfect #lotus #password #encryption
Decrypting Password-Protected DOC and XLS Files in Minutes

Accessing the content of password-protected and encrypted documents saved as DOC/XLS files (as opposed to the newer DOCX/XLSX files) is often possible without time-consuming attacks regardless of the length of the password. Advanced Office Password Recovery enables experts quickly breaking the encryption of password-protected DOC and XLS files, which are Microsoft Word and Excel documents saved by modern versions of the app in the “compatibility” format. Organizations are still using the “compatible” Office 97/2000 formats for their document workflow. More in the article:

👉 https://blog.elcomsoft.com/2022/04/decrypting-password-protected-doc-and-xls-files-in-minutes/

#aopr #microsoftoffice #word #excel #thundertables #encryption
Preventing BitLocker Lockout and Recovering Access to Encrypted System Drive

Encrypting a Windows system drive with BitLocker provides effective protection against unauthorized access, especially when paired with TPM. A hardware upgrade, firmware update or even a change in the computer’s UEFI BIOS may effectively lock you out, making your data inaccessible and the Windows system unbootable. How to prevent being locked out and how to restore access to the data if you are prompted to unlock the drive? Read along to find out.

👉 https://blog.elcomsoft.com/2022/04/preventing-bitlocker-lockout-and-recovering-access-to-encrypted-system-drive/

#BitLocker #edpr #efdd #tpm #encryption