Elcomsoft
556 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
iOS Forensic Toolkit 5.20 adds future-proof file system extraction support for Apple devices with checkra1n jailbreak

Elcomsoft iOS Forensic Toolkit 5.20 is updated with file system extraction support for select Apple devices running all versions of iOS from iOS 12 to iOS 13.3. Making use of the new future-proof bootrom exploit built into the checkra1n jailbreak, EIFT is able to extract the full file system image, decrypt passwords and authentication credentials stored in the iOS keychain.

๐Ÿ‘‰ https://www.elcomsoft.com/news/728.html

#checkra1n #jailbreak #jb #mobileforensics #eift #toolkit #ios #iPhone #exploit #informationtechnology #computerscience #riskmanagement #imessage #privacy #pentest #bruteforce #passwordcracking #code #apple #innovation #security #digitalforensics #computercrime
Meet with us at Regional Digital and Cyber Investigation CPD Workshops in Bedfordshire Police HQ (covers Bedfordshire, Hertfordshire, Cambridgeshire, Norfolk, Suffolk and Kent forces) and learn more about New approaches and possibilities in data acquisition from iOS devices. ๐Ÿ“ฒ

This and other future events can be found here: https://www.elcomsoft.com/events.html

#jailbreak #unc0ver #iPhone #iOS #dataextraction #mobileforensic #eift #toolkit #ios #iPhone #privacy #security #digitalforensics #computercrime
All mobile and cloud forensic practitioners are welcome to refresh their skills and get another professional overview of the current situation in iOS, Android, and Windows forensics allowing you to effectively retrieve and analyze mobile and cloud data. Learn the latest forensic techniques to investigate mobile devices across various mobile platforms with the help of both open source and paid solutions. The fourth edition of Practical Mobile Forensics written by our colleagues offers to explore the real-life scenarios. Thank you guys for using our tools in it!

๐Ÿ‘‰ https://www.amazon.com/dp/183864752X/

#iOS #security #iphone #mobileforensics #macos #informationtechnology #digitalforensics #dfir #cloudsecurity
Elcomsoft Distributed Password Recovery 4.21 updated with stronger privacy control, breaks Mozilla Firefox master password

Elcomsoft Distributed Password Recovery 4.21 adds support for Mozilla Firefox master passwords, enabling accelerated attacks on the Firefox password storage database. In addition, we offer stricter privacy control, enabling EDPR to perform attacks on tiny files that only contain encryption metadata extracted from Microsoft Office, Open Document, Apple iWork, Hancom and Adobe Acrobat documents without any of the actual content.

๐Ÿ‘‰ https://www.elcomsoft.com/news/746.html

๐Ÿ“ Release notes (PDF)

#firefox #hash #hashextractor #cloudcomputing #microsoftoffice #openoffice #hancom #adobe #passwordcracking #itsecurity #digitalforensics
Tighter Control over Personal Information with Attacks on Encryption Metadata


When attacking a password, the traditional forensic workflow requires uploading the entire encrypted file or document into a password recovery tool. This approach, while simple and intuitive, has one major drawback if you are using remote computers or cloud instances to perform an attack. If the remote computer is compromised, the entire file or document is leaked complete with its (still encrypted) contents. Learn how to overcome this issue and perform remote attacks without the reason of leaking personal information.

Encryption Metadata

The solution to the problem is obvious: use just the required minimum of information to run the attack. In the case of document passwords, this means...

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/05/tighter-control-over-personal-information-with-attacks-on-encryption-metadata/

#hashextractor #passwords #itsecurity #computersecurity #datasecurity #digitalforensics #dfir #cloudcomputing
Extracting and Using Stored Passwords from Web Browsers

Breaking passwords becomes more difficult with every other update of popular software. Microsoft routinely bumps the number of hash iterations to make Office document protection coherent with current hardware. Apple uses excessive protection of iTunes backups since iOS 10.1, making brute force attacks a thing of the past. VeraCrypt and BitLocker were secure from the get go. However, everything is not lost if you consider human nature.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/07/extracting-and-using-stored-passwords-from-web-browsers/

#browsers #password #passwordrecovery #cybersecurity #itsecurity #digitalforensics
Extracting Passwords from Tencent QQ Browser

QQ Browser is one of Chinaโ€™s most popular Web browsers. With some 10% of the Chinese market and the numerous Chinese users abroad, QQ Browser is used by the millions. Like many of its competitors, QQ Browser offers the ability to store website passwords. The passwords are securely encrypted, and can be only accessed once the user signs into their Windows account. Learn what you need to do to extract passwords from Tencent QQ Browser.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/07/extracting-passwords-from-tencent-qq-browser/

#browsers #password #passwordrecovery #tencent #qqbrowser #cybersecurity #itsecurity #digitalforensics
Elcomsoft Internet Password Breaker 3.20 extracts Yandex Browser, Tencent QQ and UC Browser passwords

Elcomsoft Internet Password Breaker 3.20 adds the ability to extract stored passwords from the newest versions of Yandex Browser, Tencent QQ and UC Browser. Yandex Browser is Russiaโ€™s second most popular desktop Web browser based on usage with some 17.2 per cent of the market, while QQ Browser in China floats around the 10% mark.

๐Ÿ‘‰ https://www.elcomsoft.com/news/753.html

#browsers #password #passwordrecovery #tencent #qqbrowser #ucbrowser #cybersecurity #itsecurity #digitalforensics
Mobile Forensics โ€“ Advanced Investigative Strategies

Four years ago, we published our first book: Mobile Forensics โ€“ Advanced Investigative Strategies. We are really proud of this achievement. Do you want to know the story behind it and whatโ€™s changed since then in mobile and cloud forensics? Here are some insides (but please do not tell anyone!)

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/mobile-forensics-advanced-investigative-strategies/

#dfir #mobileforensics #cybersecurity #book #digitalforensics
The ABCโ€™s of Password Cracking: The True Meaning of Speed

When adding a new encryption format or comparing the performance of different password recovery tools, we routinely quote the recovery speed expressed in the number of passwords per second. But what is the true meaning of password recovery speeds? Do the speeds depend solely, or at all, on the encryption algorithm? Whatโ€™s โ€œmilitary gradeโ€ encryption, and does it guarantee the security of your data? And why on Earth breaking AES-256 encryption takes so vastly different effort in different file formats? Read along to find out.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/11/the-abcs-of-password-cracking-the-true-meaning-of-speed/

#passwords #passwordrecovery #dfir #digitalforensics #datasecurity #dataaccess
2020 in Review: What Was New in Desktop and Mobile Forensics

This year is different from many before. The Corona pandemic, the lack of travel and canceled events had changed the business landscape for many forensic companies. Yet, even this year, we made a number of achievements weโ€™d love to share.

๐Ÿ‘‰ https://blog.elcomsoft.com/2020/12/2020-in-review-what-was-new-in-desktop-and-mobile-forensics/

#digitalforensics #mobilesecurtiy #dfir #iosacquisition #cybersecurity
NAS Forensics: Synology, ASUSTOR, QNAP, TerraMaster and Thecus Encryption Compared

More than a year ago, we started researching the available encryption options in off the shelf network attached storage devices. We started with Synology devices, followed by Asustor, TerraMaster, Thecus, and finally Qnap. The manufacturers exhibit vastly different approaches to data protection, with different limitations, security implications and vulnerabilities. Today we are publishing the aggregate results of our analysis.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/02/nas-forensics-synology-asustor-qnap-terramaster-and-thecus-encryption-compared/

#asustor #nas #digitalforensics #qnap #synology #terramaster #thecus #encryption
Password Crackersโ€™ Gold Mine: Browser Passwords

How to break โ€˜strongโ€™ passwords? Is there a methodology, a step by step approach? What shall you start from if your time is limited but you desperately need to decrypt critical evidence? We want to share some tips with you, this time about the passwords saved in the Web browsers on most popular platforms.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/06/password-crackers-gold-mine-browser-passwords/

#browser #passwords #passwordbreaker #cybersecurity #itsecurity #digitalforensics
Elcomsoft System Recovery update simplifies digital field triage

Elcomsoft System Recovery, a digital field triage tool, receives an update. The tool adds the ability to extract Wi-Fi passwords and helps identify the owner of the computer being examined by extracting its Windows license key. In addition, file system analysis is made easier with an embedded two-panel file manager.

๐Ÿ“ Release notes (PDF)

๐Ÿ‘‰ https://www.elcomsoft.com/news/789.html

#esr #wifipassword #licensekey #dfir #digitalforensics #encryption #windows
Elcomsoft System Recovery Simplifies Digital Field Triage and In-Field Investigations

Elcomsoft System Recovery is a perfect tool for digital field triage, enabling safer and more secure in-field investigations of live computers by booting from a dedicated USB media instead of using the installed OS. The recent update added a host of features to the already great tool, making it easier to examine the file system and extract passwords from the target computer.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/06/elcomsoft-system-recovery-simplifies-digital-field-triage-and-in-field-investigations/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Digital Triage Forensics: Write-Blocking, Verifiable Disk Imaging

When accessing a locked system during an in-field investigation, speed is often the most important factor. However, maintaining digital chain of custody is just as if not more important in order to produce court admissible evidence. We are introducing new features in Elcomsoft System Recovery, our forensic triage tool, to help establish and maintain digital chain of custody throughout the investigation.

๐Ÿ‘‰ https://blog.elcomsoft.com/2021/11/digital-triage-forensics-write-blocking-verifiable-disk-imaging/

#passwords #dfir #cybersecurity #datasecurity #passwordrecovery #digitalforensics
Elcomsoft System Recovery 8.20 adds Windows 11 support, bootable triage tools

Elcomsoft System Recovery, a digital field triage tool, is updated to support Windows 11 and Windows Server 2022 installations and adds a host of bootable forensic triage tools to help experts analyze computer systems in the field.

๐Ÿ‘‰ https://www.elcomsoft.com/news/809.html

๐Ÿ“ Release Notes

#esr #forensictriage #windows11 #dfir #digitalforensics
GPU Acceleration: Attacking Passwords with NVIDIA RTX Series Boards

Todayโ€™s data protection methods utilize many thousands (sometimes millions) hash iterations to strengthen password protection, slowing down the attacks to a crawl. Consumer-grade video cards are commonly used for GPU acceleration. How do these video cards compare, and what about the price-performance ratio? We tested five reasonably priced NVIDIA boards ranging from the lowly GTX 1650 to RTX 3060 Ti.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/06/gpu-acceleration-attacking-passwords-with-nvidia-rtx-series/

#edpr #gpu #dfir #password #passwordrecovery #digitalforensics
Accelerating digital forensics: Elcomsoft System Recovery boosts efficiency in forensic analysis

Elcomsoft System Recovery, a bootable forensic analysis tool for Windows, receives an update that introduces several new features designed to enhance efficiency and simplicity during in-field investigations. The updated tool enables the collection, extraction, and analysis of essential artifacts available on the computers being investigated.

๐Ÿ‘‰ https://www.elcomsoft.com/news/841.html

#ESR #Windows #DFIR #digitalforensics
Accelerating Computer Forensics: Elcomsoft System Recovery and the Low-Hanging Fruit Strategy

In the world of digital investigations, the sheer volume of data and the challenge of identifying valuable evidence can be overwhelming. Often, investigators find themselves faced with the need for optimization โ€” the ability to quickly and seamlessly identify what is valuable and requires further examination. We aim to fulfill this need by introducing a new forensic toolkit in Elcomsoft System Recovery, a powerful bootable tool designed to speed up investigations, quickly identify and collect digital evidence right on the spot. ๐Ÿ”ฅ

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/07/accelerating-computer-forensics-elcomsoft-system-recovery-and-the-low-hanging-fruit-strategy/

#ESR #Windows #DFIR #digitalforensics