Elcomsoft
560 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
Elcomsoft vs. Hashcat Part 1: Hardware Acceleration, Supported Formats and Initial Configuration

Hashcat is a great, free tool competing head to head with the tools we make. We charge several hundred dollars for what, in the end, can be done with a free tool. What are the reasons for our customers to choose ElcomSoft products instead of Hashcat, and is the expense justified? We did our best to compare the two tools to help you make the informed decision.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-part-1-hardware-acceleration-supported-formats-and-initial-configuration/

#encryption #passwords #gpucomputing #hashcat #bruteforce
Elcomsoft vs. Hashcat: Addressing Feedback

After publishing the first article in the series, we received numerous comments challenging our claims. We carefully reviewed every comment, reread and reevaluated our original article. Elcomsoft vs. Hashcat Rev.1.1 is here.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-addressing-feedback/

#passwords #hashcat #cybersecurity #passwordcracking #dfir #gpu
Elcomsoft System Recovery update: a Swiss army knife in desktop forensics

We updated Elcomsoft System Recovery, a Windows PE-based tool to recover or reset passwords to local Windows accounts and Microsoft accounts in all versions of Windows. In this release, we offer more options for recovering the original passwords as opposed to resetting while adding a multitude of other improvements.

๐Ÿ‘‰ https://www.elcomsoft.com/news/772.html

๐Ÿ“ Release Notes (PDF)

#encryption #virtualmachines #diskimage #passwords #dataaccess #passwordrecovery
Elcomsoft System Recovery: a Swiss Army Knife of Desktop Forensics

Accessing a locked system is always a challenge. Encrypted disks and encrypted virtual machines, encrypted files and passwords are just a few things to mention. In this article we are proposing a straightforward workflow for investigating computers in the field.

Note: you may be able to perform live system analysis if the computer being investigated is turned on. Our scenario assumes that the computer is initially powered off, or powered on and locked/inaccessible.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/elcomsoft-system-recovery-a-swiss-army-knife-of-desktop-forensics/

#encrypteddisks #virtualmachines #passwords #livesystemanalysis
The ABCโ€™s of Password Cracking: The True Meaning of Speed

When adding a new encryption format or comparing the performance of different password recovery tools, we routinely quote the recovery speed expressed in the number of passwords per second. But what is the true meaning of password recovery speeds? Do the speeds depend solely, or at all, on the encryption algorithm? Whatโ€™s โ€œmilitary gradeโ€ encryption, and does it guarantee the security of your data? And why on Earth breaking AES-256 encryption takes so vastly different effort in different file formats? Read along to find out.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/the-abcs-of-password-cracking-the-true-meaning-of-speed/

#passwords #passwordrecovery #dfir #digitalforensics #datasecurity #dataaccess
Elcomsoft vs. Hashcat Part 3: Attacks, Costs, Performance and Extra Features

Elcomsoft Distributed Password Recovery and Hashcat support a number of different attacks ranging from brute-force all the way to scriptable, dictionary-based attacks. The costs and performance are extremely important factors. We charge several hundred dollars for what, in the end, can be done with a free tool. Which tool has better performance, and are the extra features worth the price premium? Letโ€™s check it out.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-3-attacks-costs-performance-and-extra-features/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery
Elcomsoft vs. Hashcat Part 4: Case Studies

This is the final part of the series of articles comparing Elcomsoft Distributed Password Recovery with Hashcat. Weโ€™ve already compared the features, the price and performance of the two tools. In this study, we tried breaking passwords to several common formats, including Word document, an encrypted ZIP archive, and a VeraCrypt container. We summarized our experiences below.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-4-case-studies/

#gpu #passwords #passwordrecovery #veracrypt #zip #hashcat
Recovering Screen Time Passwords

The Screen Time password has been long recommended as an extra security layer. By setting a Screen Time password without any additional restrictions, Apple users could easily dodge attempts of changing or removing the screen lock passcode, resetting the iTunes backup password, or removing the activation lock. For a long time, removing the Screen Time password was not possible without either providing the original password or erasing the device. However, Apple had changed the way it works, making it possible to reset the Screen Time password with an iCloud/Apple ID password.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/recovering-screen-time-passwords/

#dfir #passwords #mobileforensics #ios #iphone
Elcomsoft breaks BestCrypt containers, supports NVIDIA Ampere cards

We updated Elcomsoft Forensic Disk Decryptor, Advanced Office Password Recovery and Elcomsoft Distributed Password Recovery with support for additional data formats and GPU accelerators. The updated tools break Jetico BestCrypt 9 containers, accelerate ZIP and RAR recovery on AMD and Intel GPUs, and add support for NVIDIAโ€™s latest RTX 3000-series boards based on the Ampere architecture.

๐Ÿ“ Release Notes (PDF)

๐Ÿ‘‰ https://www.elcomsoft.com/news/775.html

#gpu #passwords #passwordrecovery #zip #rar #archives #nvidia #myoffice #bestcrypt
iPhone Backups: Top 5 Default Passwords

The iPhone backup is one of the hottest topics in iOS forensics. iTunes-style backups are the core of logical acquisition used by forensic specialists, containing overwhelming amounts of evidence that is is unrivaled on other platforms. The backups, as simple as they seem, have many โ€œifsโ€ and โ€œbutsโ€, especially when it comes to password protection. We wrote a thousand and one articles about iOS backup passwords, but there is always something fresh that comes out. Today we have some new tips for you.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/iphone-backups-top-5-default-passwords/

#iphone #ios #passwords #dfir #mobilesecurity #cybersecurity
Elcomsoft breaks RAR5 and 7Zip passwords

We updated Elcomsoft Advanced Archive Password Recovery 4.60 with support for additional formats, and implemented a new, faster engine for dictionary attacks. The update brought compatibility with RAR5 and 7Zip formats, and enabled multithreaded dictionary attacks.

๐Ÿ‘‰ https://www.elcomsoft.com/news/782.html

#passwords #zip #7zip #rar #rar5 #archive #passwordrecovery
ElcomSoft extracts passwords from instant messengers

Advanced IM Password Recovery received an update, adding support for the latest versions of a large number of instant messaging apps. Version 4.91 can now extract account passwords from the newest releases of PalTalk, Pigin, Psi Jabber client, Gadu-Gadu, Gajim, Trillian, BigAnt, and Brosix instant messengers, as well as backup and restore Skype passwords.

๐Ÿ‘‰ https://www.elcomsoft.com/news/783.html

#skype #paltalk #trillian #passwords #authentication #messengers
Elcomsoft Wireless Security Auditor supports NVIDIA Ampere boards

Wireless Security Auditor 7.40 adds support for NVIDIAโ€™s latest RTX 3000-series boards based on the Ampere architecture. By using the latest NVIDIA cards, the new release greatly speeds up the recovery process, improving the chance of successful attacks.

๐Ÿ“ Release notes (in PDF)

๐Ÿ‘‰ https://www.elcomsoft.com/news/784.html

#nvidia #wifi #passwords #passwordsecurity #pentest
Our Guidelines For The World Password Day

There was a 3-fold increase in identity theft and more than 2-fold increase in phishing attacks registered in 2020 compared to 2019 according to IC3 report. A whopping 50 โ€“ 81% of attacks (depending on who you read) are targeting both corporate and private sectors to steal usersโ€™ login credentials; that is, passwords. No matter what changes happen in data security, passwords remain the most wide-spread means of protection.

Today we would like to share our list of must-dos when using password protection. So, here are our recommendations for better password habits โ€“ not that we are going to discover America here, but it will help you to brush up your current security habits.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/05/our-guidelines-for-the-world-password-day/

#worldpasswordday #passwords #passwordsecurity #cybersecurity
A Tale of One iPhone Backup Password

Have an iPhone backup but cannot get around the password protection? I have a story to share. I was recently contacted by an old partner from the other side of the world who asked for assistance in an urgent case. He had an iTunes-style backup of a device full of critical evidence, but the password locked him out of the data.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/05/iphone-backup-password-the-story/

#passwords #passwordsecurity #cybersecurity #ios #iphone #mobileforensics #dfir #iphonebackup
Password Crackersโ€™ Gold Mine: Browser Passwords

How to break โ€˜strongโ€™ passwords? Is there a methodology, a step by step approach? What shall you start from if your time is limited but you desperately need to decrypt critical evidence? We want to share some tips with you, this time about the passwords saved in the Web browsers on most popular platforms.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/06/password-crackers-gold-mine-browser-passwords/

#browser #passwords #passwordbreaker #cybersecurity #itsecurity #digitalforensics
Elcomsoft System Recovery Simplifies Digital Field Triage and In-Field Investigations

Elcomsoft System Recovery is a perfect tool for digital field triage, enabling safer and more secure in-field investigations of live computers by booting from a dedicated USB media instead of using the installed OS. The recent update added a host of features to the already great tool, making it easier to examine the file system and extract passwords from the target computer.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/06/elcomsoft-system-recovery-simplifies-digital-field-triage-and-in-field-investigations/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Digital Triage Forensics: Write-Blocking, Verifiable Disk Imaging

When accessing a locked system during an in-field investigation, speed is often the most important factor. However, maintaining digital chain of custody is just as if not more important in order to produce court admissible evidence. We are introducing new features in Elcomsoft System Recovery, our forensic triage tool, to help establish and maintain digital chain of custody throughout the investigation.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/11/digital-triage-forensics-write-blocking-verifiable-disk-imaging/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Worthless Security Practices

Many security practices still widely accepted today are things of the past. Many of them made sense at the time of short passwords and unrestricted access to workplaces, while some were learned from TV shows with โ€œRussian hackersโ€ breaking Pentagon. In this article weโ€™ll sort it out.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/12/worthless-security-practices/
#passwords #itsecurity
A Word About Dictionaries

Dictionary attacks are among the most effective ones because they rely on the human nature. It is human nature to select passwords that are easily memoizable, like their pet names, dates of birth, football teams or whatever. BBC counted 171,146 words in the English dictionary, while a typical native speaker (of any language) knows 15,000 to 20,000 word families (lemmas, or root words and inflections). Whatever the attack speed is, it will not take too much time to check all the English words.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/03/a-word-about-dictionaries/

#passwords #EDPR #dictionary #password #dfir