Elcomsoft vs. Hashcat Part 1: Hardware Acceleration, Supported Formats and Initial Configuration
Hashcat is a great, free tool competing head to head with the tools we make. We charge several hundred dollars for what, in the end, can be done with a free tool. What are the reasons for our customers to choose ElcomSoft products instead of Hashcat, and is the expense justified? We did our best to compare the two tools to help you make the informed decision.
๐ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-part-1-hardware-acceleration-supported-formats-and-initial-configuration/
#encryption #passwords #gpucomputing #hashcat #bruteforce
Hashcat is a great, free tool competing head to head with the tools we make. We charge several hundred dollars for what, in the end, can be done with a free tool. What are the reasons for our customers to choose ElcomSoft products instead of Hashcat, and is the expense justified? We did our best to compare the two tools to help you make the informed decision.
๐ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-part-1-hardware-acceleration-supported-formats-and-initial-configuration/
#encryption #passwords #gpucomputing #hashcat #bruteforce
Elcomsoft vs. Hashcat: Addressing Feedback
After publishing the first article in the series, we received numerous comments challenging our claims. We carefully reviewed every comment, reread and reevaluated our original article. Elcomsoft vs. Hashcat Rev.1.1 is here.
๐ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-addressing-feedback/
#passwords #hashcat #cybersecurity #passwordcracking #dfir #gpu
After publishing the first article in the series, we received numerous comments challenging our claims. We carefully reviewed every comment, reread and reevaluated our original article. Elcomsoft vs. Hashcat Rev.1.1 is here.
๐ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-addressing-feedback/
#passwords #hashcat #cybersecurity #passwordcracking #dfir #gpu
Elcomsoft System Recovery update: a Swiss army knife in desktop forensics
We updated Elcomsoft System Recovery, a Windows PE-based tool to recover or reset passwords to local Windows accounts and Microsoft accounts in all versions of Windows. In this release, we offer more options for recovering the original passwords as opposed to resetting while adding a multitude of other improvements.
๐ https://www.elcomsoft.com/news/772.html
๐ Release Notes (PDF)
#encryption #virtualmachines #diskimage #passwords #dataaccess #passwordrecovery
We updated Elcomsoft System Recovery, a Windows PE-based tool to recover or reset passwords to local Windows accounts and Microsoft accounts in all versions of Windows. In this release, we offer more options for recovering the original passwords as opposed to resetting while adding a multitude of other improvements.
๐ https://www.elcomsoft.com/news/772.html
๐ Release Notes (PDF)
#encryption #virtualmachines #diskimage #passwords #dataaccess #passwordrecovery
Elcomsoft System Recovery: a Swiss Army Knife of Desktop Forensics
Accessing a locked system is always a challenge. Encrypted disks and encrypted virtual machines, encrypted files and passwords are just a few things to mention. In this article we are proposing a straightforward workflow for investigating computers in the field.
Note: you may be able to perform live system analysis if the computer being investigated is turned on. Our scenario assumes that the computer is initially powered off, or powered on and locked/inaccessible.
๐ https://blog.elcomsoft.com/2020/11/elcomsoft-system-recovery-a-swiss-army-knife-of-desktop-forensics/
#encrypteddisks #virtualmachines #passwords #livesystemanalysis
Accessing a locked system is always a challenge. Encrypted disks and encrypted virtual machines, encrypted files and passwords are just a few things to mention. In this article we are proposing a straightforward workflow for investigating computers in the field.
Note: you may be able to perform live system analysis if the computer being investigated is turned on. Our scenario assumes that the computer is initially powered off, or powered on and locked/inaccessible.
๐ https://blog.elcomsoft.com/2020/11/elcomsoft-system-recovery-a-swiss-army-knife-of-desktop-forensics/
#encrypteddisks #virtualmachines #passwords #livesystemanalysis
The ABCโs of Password Cracking: The True Meaning of Speed
When adding a new encryption format or comparing the performance of different password recovery tools, we routinely quote the recovery speed expressed in the number of passwords per second. But what is the true meaning of password recovery speeds? Do the speeds depend solely, or at all, on the encryption algorithm? Whatโs โmilitary gradeโ encryption, and does it guarantee the security of your data? And why on Earth breaking AES-256 encryption takes so vastly different effort in different file formats? Read along to find out.
๐ https://blog.elcomsoft.com/2020/11/the-abcs-of-password-cracking-the-true-meaning-of-speed/
#passwords #passwordrecovery #dfir #digitalforensics #datasecurity #dataaccess
When adding a new encryption format or comparing the performance of different password recovery tools, we routinely quote the recovery speed expressed in the number of passwords per second. But what is the true meaning of password recovery speeds? Do the speeds depend solely, or at all, on the encryption algorithm? Whatโs โmilitary gradeโ encryption, and does it guarantee the security of your data? And why on Earth breaking AES-256 encryption takes so vastly different effort in different file formats? Read along to find out.
๐ https://blog.elcomsoft.com/2020/11/the-abcs-of-password-cracking-the-true-meaning-of-speed/
#passwords #passwordrecovery #dfir #digitalforensics #datasecurity #dataaccess
Elcomsoft vs. Hashcat Part 3: Attacks, Costs, Performance and Extra Features
Elcomsoft Distributed Password Recovery and Hashcat support a number of different attacks ranging from brute-force all the way to scriptable, dictionary-based attacks. The costs and performance are extremely important factors. We charge several hundred dollars for what, in the end, can be done with a free tool. Which tool has better performance, and are the extra features worth the price premium? Letโs check it out.
๐ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-3-attacks-costs-performance-and-extra-features/
#passwords #dfir #cybersecurity #datasecurity #passwordrecovery
Elcomsoft Distributed Password Recovery and Hashcat support a number of different attacks ranging from brute-force all the way to scriptable, dictionary-based attacks. The costs and performance are extremely important factors. We charge several hundred dollars for what, in the end, can be done with a free tool. Which tool has better performance, and are the extra features worth the price premium? Letโs check it out.
๐ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-3-attacks-costs-performance-and-extra-features/
#passwords #dfir #cybersecurity #datasecurity #passwordrecovery
Elcomsoft vs. Hashcat Part 4: Case Studies
This is the final part of the series of articles comparing Elcomsoft Distributed Password Recovery with Hashcat. Weโve already compared the features, the price and performance of the two tools. In this study, we tried breaking passwords to several common formats, including Word document, an encrypted ZIP archive, and a VeraCrypt container. We summarized our experiences below.
๐ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-4-case-studies/
#gpu #passwords #passwordrecovery #veracrypt #zip #hashcat
This is the final part of the series of articles comparing Elcomsoft Distributed Password Recovery with Hashcat. Weโve already compared the features, the price and performance of the two tools. In this study, we tried breaking passwords to several common formats, including Word document, an encrypted ZIP archive, and a VeraCrypt container. We summarized our experiences below.
๐ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-4-case-studies/
#gpu #passwords #passwordrecovery #veracrypt #zip #hashcat
Recovering Screen Time Passwords
The Screen Time password has been long recommended as an extra security layer. By setting a Screen Time password without any additional restrictions, Apple users could easily dodge attempts of changing or removing the screen lock passcode, resetting the iTunes backup password, or removing the activation lock. For a long time, removing the Screen Time password was not possible without either providing the original password or erasing the device. However, Apple had changed the way it works, making it possible to reset the Screen Time password with an iCloud/Apple ID password.
๐ https://blog.elcomsoft.com/2020/12/recovering-screen-time-passwords/
#dfir #passwords #mobileforensics #ios #iphone
The Screen Time password has been long recommended as an extra security layer. By setting a Screen Time password without any additional restrictions, Apple users could easily dodge attempts of changing or removing the screen lock passcode, resetting the iTunes backup password, or removing the activation lock. For a long time, removing the Screen Time password was not possible without either providing the original password or erasing the device. However, Apple had changed the way it works, making it possible to reset the Screen Time password with an iCloud/Apple ID password.
๐ https://blog.elcomsoft.com/2020/12/recovering-screen-time-passwords/
#dfir #passwords #mobileforensics #ios #iphone
Elcomsoft breaks BestCrypt containers, supports NVIDIA Ampere cards
We updated Elcomsoft Forensic Disk Decryptor, Advanced Office Password Recovery and Elcomsoft Distributed Password Recovery with support for additional data formats and GPU accelerators. The updated tools break Jetico BestCrypt 9 containers, accelerate ZIP and RAR recovery on AMD and Intel GPUs, and add support for NVIDIAโs latest RTX 3000-series boards based on the Ampere architecture.
๐ Release Notes (PDF)
๐ https://www.elcomsoft.com/news/775.html
#gpu #passwords #passwordrecovery #zip #rar #archives #nvidia #myoffice #bestcrypt
We updated Elcomsoft Forensic Disk Decryptor, Advanced Office Password Recovery and Elcomsoft Distributed Password Recovery with support for additional data formats and GPU accelerators. The updated tools break Jetico BestCrypt 9 containers, accelerate ZIP and RAR recovery on AMD and Intel GPUs, and add support for NVIDIAโs latest RTX 3000-series boards based on the Ampere architecture.
๐ Release Notes (PDF)
๐ https://www.elcomsoft.com/news/775.html
#gpu #passwords #passwordrecovery #zip #rar #archives #nvidia #myoffice #bestcrypt
iPhone Backups: Top 5 Default Passwords
The iPhone backup is one of the hottest topics in iOS forensics. iTunes-style backups are the core of logical acquisition used by forensic specialists, containing overwhelming amounts of evidence that is is unrivaled on other platforms. The backups, as simple as they seem, have many โifsโ and โbutsโ, especially when it comes to password protection. We wrote a thousand and one articles about iOS backup passwords, but there is always something fresh that comes out. Today we have some new tips for you.
๐ https://blog.elcomsoft.com/2020/12/iphone-backups-top-5-default-passwords/
#iphone #ios #passwords #dfir #mobilesecurity #cybersecurity
The iPhone backup is one of the hottest topics in iOS forensics. iTunes-style backups are the core of logical acquisition used by forensic specialists, containing overwhelming amounts of evidence that is is unrivaled on other platforms. The backups, as simple as they seem, have many โifsโ and โbutsโ, especially when it comes to password protection. We wrote a thousand and one articles about iOS backup passwords, but there is always something fresh that comes out. Today we have some new tips for you.
๐ https://blog.elcomsoft.com/2020/12/iphone-backups-top-5-default-passwords/
#iphone #ios #passwords #dfir #mobilesecurity #cybersecurity
Elcomsoft breaks RAR5 and 7Zip passwords
We updated Elcomsoft Advanced Archive Password Recovery 4.60 with support for additional formats, and implemented a new, faster engine for dictionary attacks. The update brought compatibility with RAR5 and 7Zip formats, and enabled multithreaded dictionary attacks.
๐ https://www.elcomsoft.com/news/782.html
#passwords #zip #7zip #rar #rar5 #archive #passwordrecovery
We updated Elcomsoft Advanced Archive Password Recovery 4.60 with support for additional formats, and implemented a new, faster engine for dictionary attacks. The update brought compatibility with RAR5 and 7Zip formats, and enabled multithreaded dictionary attacks.
๐ https://www.elcomsoft.com/news/782.html
#passwords #zip #7zip #rar #rar5 #archive #passwordrecovery
ElcomSoft extracts passwords from instant messengers
Advanced IM Password Recovery received an update, adding support for the latest versions of a large number of instant messaging apps. Version 4.91 can now extract account passwords from the newest releases of PalTalk, Pigin, Psi Jabber client, Gadu-Gadu, Gajim, Trillian, BigAnt, and Brosix instant messengers, as well as backup and restore Skype passwords.
๐ https://www.elcomsoft.com/news/783.html
#skype #paltalk #trillian #passwords #authentication #messengers
Advanced IM Password Recovery received an update, adding support for the latest versions of a large number of instant messaging apps. Version 4.91 can now extract account passwords from the newest releases of PalTalk, Pigin, Psi Jabber client, Gadu-Gadu, Gajim, Trillian, BigAnt, and Brosix instant messengers, as well as backup and restore Skype passwords.
๐ https://www.elcomsoft.com/news/783.html
#skype #paltalk #trillian #passwords #authentication #messengers
Elcomsoft Wireless Security Auditor supports NVIDIA Ampere boards
Wireless Security Auditor 7.40 adds support for NVIDIAโs latest RTX 3000-series boards based on the Ampere architecture. By using the latest NVIDIA cards, the new release greatly speeds up the recovery process, improving the chance of successful attacks.
๐ Release notes (in PDF)
๐ https://www.elcomsoft.com/news/784.html
#nvidia #wifi #passwords #passwordsecurity #pentest
Wireless Security Auditor 7.40 adds support for NVIDIAโs latest RTX 3000-series boards based on the Ampere architecture. By using the latest NVIDIA cards, the new release greatly speeds up the recovery process, improving the chance of successful attacks.
๐ Release notes (in PDF)
๐ https://www.elcomsoft.com/news/784.html
#nvidia #wifi #passwords #passwordsecurity #pentest
Our Guidelines For The World Password Day
There was a 3-fold increase in identity theft and more than 2-fold increase in phishing attacks registered in 2020 compared to 2019 according to IC3 report. A whopping 50 โ 81% of attacks (depending on who you read) are targeting both corporate and private sectors to steal usersโ login credentials; that is, passwords. No matter what changes happen in data security, passwords remain the most wide-spread means of protection.
Today we would like to share our list of must-dos when using password protection. So, here are our recommendations for better password habits โ not that we are going to discover America here, but it will help you to brush up your current security habits.
๐ https://blog.elcomsoft.com/2021/05/our-guidelines-for-the-world-password-day/
#worldpasswordday #passwords #passwordsecurity #cybersecurity
There was a 3-fold increase in identity theft and more than 2-fold increase in phishing attacks registered in 2020 compared to 2019 according to IC3 report. A whopping 50 โ 81% of attacks (depending on who you read) are targeting both corporate and private sectors to steal usersโ login credentials; that is, passwords. No matter what changes happen in data security, passwords remain the most wide-spread means of protection.
Today we would like to share our list of must-dos when using password protection. So, here are our recommendations for better password habits โ not that we are going to discover America here, but it will help you to brush up your current security habits.
๐ https://blog.elcomsoft.com/2021/05/our-guidelines-for-the-world-password-day/
#worldpasswordday #passwords #passwordsecurity #cybersecurity
A Tale of One iPhone Backup Password
Have an iPhone backup but cannot get around the password protection? I have a story to share. I was recently contacted by an old partner from the other side of the world who asked for assistance in an urgent case. He had an iTunes-style backup of a device full of critical evidence, but the password locked him out of the data.
๐ https://blog.elcomsoft.com/2021/05/iphone-backup-password-the-story/
#passwords #passwordsecurity #cybersecurity #ios #iphone #mobileforensics #dfir #iphonebackup
Have an iPhone backup but cannot get around the password protection? I have a story to share. I was recently contacted by an old partner from the other side of the world who asked for assistance in an urgent case. He had an iTunes-style backup of a device full of critical evidence, but the password locked him out of the data.
๐ https://blog.elcomsoft.com/2021/05/iphone-backup-password-the-story/
#passwords #passwordsecurity #cybersecurity #ios #iphone #mobileforensics #dfir #iphonebackup
Password Crackersโ Gold Mine: Browser Passwords
How to break โstrongโ passwords? Is there a methodology, a step by step approach? What shall you start from if your time is limited but you desperately need to decrypt critical evidence? We want to share some tips with you, this time about the passwords saved in the Web browsers on most popular platforms.
๐ https://blog.elcomsoft.com/2021/06/password-crackers-gold-mine-browser-passwords/
#browser #passwords #passwordbreaker #cybersecurity #itsecurity #digitalforensics
How to break โstrongโ passwords? Is there a methodology, a step by step approach? What shall you start from if your time is limited but you desperately need to decrypt critical evidence? We want to share some tips with you, this time about the passwords saved in the Web browsers on most popular platforms.
๐ https://blog.elcomsoft.com/2021/06/password-crackers-gold-mine-browser-passwords/
#browser #passwords #passwordbreaker #cybersecurity #itsecurity #digitalforensics
Elcomsoft System Recovery Simplifies Digital Field Triage and In-Field Investigations
Elcomsoft System Recovery is a perfect tool for digital field triage, enabling safer and more secure in-field investigations of live computers by booting from a dedicated USB media instead of using the installed OS. The recent update added a host of features to the already great tool, making it easier to examine the file system and extract passwords from the target computer.
๐ https://blog.elcomsoft.com/2021/06/elcomsoft-system-recovery-simplifies-digital-field-triage-and-in-field-investigations/
#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Elcomsoft System Recovery is a perfect tool for digital field triage, enabling safer and more secure in-field investigations of live computers by booting from a dedicated USB media instead of using the installed OS. The recent update added a host of features to the already great tool, making it easier to examine the file system and extract passwords from the target computer.
๐ https://blog.elcomsoft.com/2021/06/elcomsoft-system-recovery-simplifies-digital-field-triage-and-in-field-investigations/
#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Digital Triage Forensics: Write-Blocking, Verifiable Disk Imaging
When accessing a locked system during an in-field investigation, speed is often the most important factor. However, maintaining digital chain of custody is just as if not more important in order to produce court admissible evidence. We are introducing new features in Elcomsoft System Recovery, our forensic triage tool, to help establish and maintain digital chain of custody throughout the investigation.
๐ https://blog.elcomsoft.com/2021/11/digital-triage-forensics-write-blocking-verifiable-disk-imaging/
#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
When accessing a locked system during an in-field investigation, speed is often the most important factor. However, maintaining digital chain of custody is just as if not more important in order to produce court admissible evidence. We are introducing new features in Elcomsoft System Recovery, our forensic triage tool, to help establish and maintain digital chain of custody throughout the investigation.
๐ https://blog.elcomsoft.com/2021/11/digital-triage-forensics-write-blocking-verifiable-disk-imaging/
#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Worthless Security Practices
Many security practices still widely accepted today are things of the past. Many of them made sense at the time of short passwords and unrestricted access to workplaces, while some were learned from TV shows with โRussian hackersโ breaking Pentagon. In this article weโll sort it out.
๐ https://blog.elcomsoft.com/2021/12/worthless-security-practices/
#passwords #itsecurity
Many security practices still widely accepted today are things of the past. Many of them made sense at the time of short passwords and unrestricted access to workplaces, while some were learned from TV shows with โRussian hackersโ breaking Pentagon. In this article weโll sort it out.
๐ https://blog.elcomsoft.com/2021/12/worthless-security-practices/
#passwords #itsecurity
A Word About Dictionaries
Dictionary attacks are among the most effective ones because they rely on the human nature. It is human nature to select passwords that are easily memoizable, like their pet names, dates of birth, football teams or whatever. BBC counted 171,146 words in the English dictionary, while a typical native speaker (of any language) knows 15,000 to 20,000 word families (lemmas, or root words and inflections). Whatever the attack speed is, it will not take too much time to check all the English words.
๐๐ป https://blog.elcomsoft.com/2023/03/a-word-about-dictionaries/
#passwords #EDPR #dictionary #password #dfir
Dictionary attacks are among the most effective ones because they rely on the human nature. It is human nature to select passwords that are easily memoizable, like their pet names, dates of birth, football teams or whatever. BBC counted 171,146 words in the English dictionary, while a typical native speaker (of any language) knows 15,000 to 20,000 word families (lemmas, or root words and inflections). Whatever the attack speed is, it will not take too much time to check all the English words.
๐๐ป https://blog.elcomsoft.com/2023/03/a-word-about-dictionaries/
#passwords #EDPR #dictionary #password #dfir