Elcomsoft
556 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
Elcomsoft System Recovery adds BitLocker support

We updated Elcomsoft System Recovery, a Windows PE-based tool to recover or reset passwords to local Windows accounts and Microsoft accounts in all versions of Windows. The tool adds native support for BitLocker volumes, enabling users to mount BitLocker-encrypted partitions using one of the three supported disk protectors.

๐Ÿ“ Release Notes

๐Ÿ‘‰ https://www.elcomsoft.com/news/752.html

#bitlocker #password #recoverykey #usbkey #boot #encryption #fde #cybersecurity #itsecurity #computerforensics
Extracting and Using Stored Passwords from Web Browsers

Breaking passwords becomes more difficult with every other update of popular software. Microsoft routinely bumps the number of hash iterations to make Office document protection coherent with current hardware. Apple uses excessive protection of iTunes backups since iOS 10.1, making brute force attacks a thing of the past. VeraCrypt and BitLocker were secure from the get go. However, everything is not lost if you consider human nature.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/07/extracting-and-using-stored-passwords-from-web-browsers/

#browsers #password #passwordrecovery #cybersecurity #itsecurity #digitalforensics
Extracting Passwords from Tencent QQ Browser

QQ Browser is one of Chinaโ€™s most popular Web browsers. With some 10% of the Chinese market and the numerous Chinese users abroad, QQ Browser is used by the millions. Like many of its competitors, QQ Browser offers the ability to store website passwords. The passwords are securely encrypted, and can be only accessed once the user signs into their Windows account. Learn what you need to do to extract passwords from Tencent QQ Browser.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/07/extracting-passwords-from-tencent-qq-browser/

#browsers #password #passwordrecovery #tencent #qqbrowser #cybersecurity #itsecurity #digitalforensics
Elcomsoft Internet Password Breaker 3.20 extracts Yandex Browser, Tencent QQ and UC Browser passwords

Elcomsoft Internet Password Breaker 3.20 adds the ability to extract stored passwords from the newest versions of Yandex Browser, Tencent QQ and UC Browser. Yandex Browser is Russiaโ€™s second most popular desktop Web browser based on usage with some 17.2 per cent of the market, while QQ Browser in China floats around the 10% mark.

๐Ÿ‘‰ https://www.elcomsoft.com/news/753.html

#browsers #password #passwordrecovery #tencent #qqbrowser #ucbrowser #cybersecurity #itsecurity #digitalforensics
Advanced Office Password Recovery 6.60 adds Hancom Office, iWork 2020 v10 support

Advanced Office Password Recovery (AOPR) adds support for the latest edition of Hancom Office 2020, now supporting Hancom documents saved in the new format. Version 6.60 offers full compatibility with Hancom Office Word 2020 documents and Cell 2020 workbooks, as well as the documents produced by iWork 2020.

๐Ÿ‘‰ https://www.elcomsoft.com/news/754.html

#password #hancom #office #iwork #passwordprotection #cybersecurity #itsecurity #infosec
Everything You Wanted to Ask About Cracking Passwords


Making tools for breaking passwords, I am frequently asked whether itโ€™s legal, or how it works, or what one can do to protect their password from being cracked. There are people who have โ€œnothing to hideโ€. There are those wearing tin foil hats, but there are a lot more people who can make a reasonable effort to secure their lives without going overboard. This article is for them.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/10/everything-you-wanted-to-ask-about-cracking-passwords/

#passwords #cybersecurity #itsecurity
Mobile Forensics โ€“ Advanced Investigative Strategies

Four years ago, we published our first book: Mobile Forensics โ€“ Advanced Investigative Strategies. We are really proud of this achievement. Do you want to know the story behind it and whatโ€™s changed since then in mobile and cloud forensics? Here are some insides (but please do not tell anyone!)

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/mobile-forensics-advanced-investigative-strategies/

#dfir #mobileforensics #cybersecurity #book #digitalforensics
Elcomsoft vs. Hashcat: Addressing Feedback

After publishing the first article in the series, we received numerous comments challenging our claims. We carefully reviewed every comment, reread and reevaluated our original article. Elcomsoft vs. Hashcat Rev.1.1 is here.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/elcomsoft-vs-hashcat-addressing-feedback/

#passwords #hashcat #cybersecurity #passwordcracking #dfir #gpu
Elcomsoft vs. Hashcat Part 3: Attacks, Costs, Performance and Extra Features

Elcomsoft Distributed Password Recovery and Hashcat support a number of different attacks ranging from brute-force all the way to scriptable, dictionary-based attacks. The costs and performance are extremely important factors. We charge several hundred dollars for what, in the end, can be done with a free tool. Which tool has better performance, and are the extra features worth the price premium? Letโ€™s check it out.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/elcomsoft-vs-hashcat-part-3-attacks-costs-performance-and-extra-features/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery
iOS Forensic Toolkit 6.60: jailbreak-free extraction for iOS 9.0 through 13.7

Elcomsoft iOS Forensic Toolkit 6.60 extends the coverage for jailbreak-free extraction from iOS 9.0 all the way through iOS 13.7, adding support to the last versions of iOS 13 ever released. The new release expands the availability of the extraction agent, adding full file system and keychain decryption support for previously unsupported versions of iOS 13.5.1 to 13.7 on all compatible iPhone and iPad devices.

๐Ÿ“ Release Notes (PDF)

๐Ÿ‘‰ https://www.elcomsoft.com/news/774.html

#ios #iphone #mobileforensics #dfir #cybersecurity #EIFTagent #dataextraction
iPhone Backups: Top 5 Default Passwords

The iPhone backup is one of the hottest topics in iOS forensics. iTunes-style backups are the core of logical acquisition used by forensic specialists, containing overwhelming amounts of evidence that is is unrivaled on other platforms. The backups, as simple as they seem, have many โ€œifsโ€ and โ€œbutsโ€, especially when it comes to password protection. We wrote a thousand and one articles about iOS backup passwords, but there is always something fresh that comes out. Today we have some new tips for you.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/iphone-backups-top-5-default-passwords/

#iphone #ios #passwords #dfir #mobilesecurity #cybersecurity
2020 in Review: What Was New in Desktop and Mobile Forensics

This year is different from many before. The Corona pandemic, the lack of travel and canceled events had changed the business landscape for many forensic companies. Yet, even this year, we made a number of achievements weโ€™d love to share.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/2020-in-review-what-was-new-in-desktop-and-mobile-forensics/

#digitalforensics #mobilesecurtiy #dfir #iosacquisition #cybersecurity
Apple Scraps End-to-End Encryption of iCloud Backups

Reportedly, Apple dropped plan for encrypting backups after FBI complained. Appleโ€™s decision will undoubtedly cause turmoil and will have a number of consequences. In this article, I want to talk about the technical reasons for encrypting or not encrypting cloud backup, and compare Appleโ€™s approach with the data encryption strategies used by Google, who have been encrypting Android backups for several years.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/01/apple-scraps-end-to-end-encryption-of-icloud-backups/

#dfir #cybersecurity #mobileforensics #e2ee #icloud
Apple, FBI and iPhone Backup Encryption: Everything You Wanted to Know

Shame on us, we somehow missed the whole issue about Apple dropping plan for encrypting backups after FBI complained, even mentioned in The Cybersecurity Stories We Were Jealous of in 2020 (and many reprints). In the meantime, the article is full of rumors, guesses, and unverified and technically dubious information. โ€œFake newsโ€, so to say. Is there truth to the rumors, and what does Apple do and does not do when it comes to encrypting your personal information?

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/01/apple-fbi-and-iphone-backup-encryption-everything-you-wanted-to-know/

#ios #iphone #fbi #mobilesecurity #dfir #cybersecurity
Breaking Jetico BestCrypt

BestCrypt, developed by the Finnish company Jetico, is a cross-platform commercial disk encryption tool. Available for Windows, Linux, macOS and Android platforms, BestCrypt is delivered in two editions, one offering full-disk encryption and the other encrypting virtual disk volumes stored in containers, the latter being supported with our tools.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/02/breaking-jetico-bestcrypt/

#jetico #bestcrypt #encryption #cybersecurity
Our Guidelines For The World Password Day

There was a 3-fold increase in identity theft and more than 2-fold increase in phishing attacks registered in 2020 compared to 2019 according to IC3 report. A whopping 50 โ€“ 81% of attacks (depending on who you read) are targeting both corporate and private sectors to steal usersโ€™ login credentials; that is, passwords. No matter what changes happen in data security, passwords remain the most wide-spread means of protection.

Today we would like to share our list of must-dos when using password protection. So, here are our recommendations for better password habits โ€“ not that we are going to discover America here, but it will help you to brush up your current security habits.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/05/our-guidelines-for-the-world-password-day/

#worldpasswordday #passwords #passwordsecurity #cybersecurity
A Tale of One iPhone Backup Password

Have an iPhone backup but cannot get around the password protection? I have a story to share. I was recently contacted by an old partner from the other side of the world who asked for assistance in an urgent case. He had an iTunes-style backup of a device full of critical evidence, but the password locked him out of the data.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/05/iphone-backup-password-the-story/

#passwords #passwordsecurity #cybersecurity #ios #iphone #mobileforensics #dfir #iphonebackup
Password Crackersโ€™ Gold Mine: Browser Passwords

How to break โ€˜strongโ€™ passwords? Is there a methodology, a step by step approach? What shall you start from if your time is limited but you desperately need to decrypt critical evidence? We want to share some tips with you, this time about the passwords saved in the Web browsers on most popular platforms.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/06/password-crackers-gold-mine-browser-passwords/

#browser #passwords #passwordbreaker #cybersecurity #itsecurity #digitalforensics
Elcomsoft System Recovery Simplifies Digital Field Triage and In-Field Investigations

Elcomsoft System Recovery is a perfect tool for digital field triage, enabling safer and more secure in-field investigations of live computers by booting from a dedicated USB media instead of using the installed OS. The recent update added a host of features to the already great tool, making it easier to examine the file system and extract passwords from the target computer.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/06/elcomsoft-system-recovery-simplifies-digital-field-triage-and-in-field-investigations/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Digital Triage Forensics: Write-Blocking, Verifiable Disk Imaging

When accessing a locked system during an in-field investigation, speed is often the most important factor. However, maintaining digital chain of custody is just as if not more important in order to produce court admissible evidence. We are introducing new features in Elcomsoft System Recovery, our forensic triage tool, to help establish and maintain digital chain of custody throughout the investigation.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/11/digital-triage-forensics-write-blocking-verifiable-disk-imaging/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics