Archive for the ‘Cryptography’ Category

Thunder Tables™ Explained

Thursday, May 21st, 2009

From time to time we’re receiving questions regarding various technologies used in our products, especially Thunder Tables™ and GPU acceleration. Today I’d like to explain what exactly Thunder Tables™ is (and what it’s not).

 

(more…)

DC4420

Tuesday, May 12th, 2009

Apart from official IT Security events, London ethical hackers like to organize monthly meetings such as DC4420 in clubs, sometimes changing their location. In an informal manner they exchange their experience, represent new ideas and technologies.

We learned about this event first from icesurfer who follows us on twitter when he dropped by our booth at InfoSecurity Europe 2009 to say hello and so we’ve been lucky to get an invitation to this underground “techno-party”. 
 
After a busy day at the exhibition talking to all from sales guys to journalists this warm and welcome gathering tempted us to stay longer. However, our plane (back to Moscow) was to take off the next morning that is why we could only hear the first presentation (out of three) and to be frank got an over-the-top-pleasure hearing it.
In brief, Andrea Barisani and Daniele Bianco explained how one could find out what is being typed on the keyboard through searching electric signal oscillation registered on a common power socket or even water-pipe. All accompanied by humorous visuals starred by both speakers.
 
 
The second part of presentation introduced a new approach to a pretty known technology for electronic-acoustic reconnaissance – using laser microphone for registering sound vibration as far as 200-300m away. The idea is not fresh, and usually a common window serves as sound reflector. But our techies decided to use laptop cover/display for recording vibrations caused by pressing different keys on the keyboard. Each key has its particular sound. After analyzing laser vibration we get possible variants of typed text. Provided we know what language is being used, it is not a problem to find a right variant.
 
Smart presentations sandwiched between informal chatting and drinking beer gives an absolute sense of belonging to the world of wayward technologies.
 

From InfoSecurity, “the number One in Europe”

Tuesday, April 28th, 2009

We never thought that our participation would bring such kind of trouble (or at least a disappointment).

Monday early morning we came to prepare our stand and apply our wallpapers (yes, we do it ourselves, sort of team building :)). Practically, everything went smoothly, except for the fact that the organizers did not fix our company name board, electricity was not there and finally – we have got less space than we ordered (and paid for) because wall panels were not constructed properly. But after all, [almost] everything was fixed. Unfortunately, we have not made any pictures, but here is how it should look like (by design):

Click to enlarge

Next morning (the first day of the exhibition) we came to our booth in advance (about half an hour before the exhibition opens). And what we have seen? Two persons (from Reed Exhibitions, the organizers of this event) removing one of the wall papers from our booth – the one that said that we’re doing PGP password recovery. Moreover, we were not able to get the clear answer why they’re doing that, except the fact that “PGP Corporation complained”. And the reference to some “regulations” we still have not seen. We asked for some official paper (act?) about our “violation”, and still waiting for it. When (if?) we’ll get it, we’ll scan it and publish here.

Fortunately, we had the camera handy, and so made several photos of this “process” (removing our wall paper). Organizers (Reed) did not like that, too, and tried to hide their faces from the camera. But they failed, so you can see them now (and the whole “process”):

Click to enlarge

Click to enlarge

Click to enlarge

Click to enlarge

Click to enlarge

Click to enlarge

Click to enlarge

Click to enlarge

Click to enlarge

Cliick to enlarge

Click to enlarge

So we had to put the following note here (fortunately, on one panel only):

Click to enlarge

Click to enlarge

Only two hours later, they (Reed Exhibitions Group Event Director) came to our booth and asked to remove this note. Oops, sorry: not asked, just removed. Without explanation. Well, the explanation was: we have the right to do anything here.

What are they (PGP) scared about? I don’t have an answer. Do we say that PGP protection/encryption is not secure? No we don’t. But we DO say that PGP passwords can be cracked – if they are not selected carefully. But if PGP people cannot explain that to their clients – this is not our fault.

Update: see What does "The only way to break into PGP" mean?

Dangerously Easy Password Recovery

Thursday, April 23rd, 2009

There is only one way to break through PGP® encryption – GPU accelerated brute force – and that one is too many. New Elcomsoft Distributed Password Recovery v. 2.80.206 crunches PGP® passwords 200 times faster using graphic chips.

EDPR is all for cutting unnecessary costs, saving time and energy. Just using video cads you have at hand can result in excellent performance. In the graph you can see a huge leap in speed since graphic cards came into action.

 

EDPR Benchmarks (PGP® Disk/WDE)

TROOPERS09 – are you with hackers or what?

Wednesday, April 22nd, 2009

If you added this blog to your news feeder, then you prefer getting skilled rather than getting owned – as in Troopers’ motto.

Troopers09 is an international IT-Security Conference held in Munich, Germany. This event is created for CISOs, ISOs, IT-Auditors, IT-Sec-Admins, IT-Sec Consultants and everyone who is involved with IT-Security on a professional basis. The goal is to share in-depth knowledge about the aspects of attacking and defending information technology infrastructure and applications. The featured presentations and demonstrations represent the latest discoveries and developments of the global hacking scene and will provide the audience with valuable practical know-how.

Andrey Belenko ( ElcomSoft’s Lead IT Security Analyst) will enjoy the conference and give a talk tomorrow (on 23rd April 2009) at 16:00 – 16:45, here is an abstract of his speech: http://troopers09.org/content/e3/e282/index_eng.html 

 

NEW: Rainbow Tables for password-protected Excel spreadsheets

Thursday, April 16th, 2009

And now…. we have Rainbow Tables for Microsoft Excel docs with 40-bit encryption. So, it became possible to reach near-instant recovery of 97% of spreadsheets created in MS Excel 97-2003. Unfortunately, due to specificity of Excel spreadsheets format it’s unreal to get 100%-recovery, still, you can use brute force to cover the rest 3%.  

Loading….

Attacking…

Result!

Lotus Notes ID files password cracking

Friday, April 10th, 2009

You’re probably aware that our Distributed Password Recovery works with Lotus Notes ID files (as well as with two dozen other file formats, of course). Some sad news: in latest versions of Notes (8.5), encryption has been improved. In older versions, only 64-bit and 128-bit RC2 options were available, but now you can also use AES (128-bit or 256-bit). Well, encryption itself does not actually matter, but the problem is that password verification routine is not much better (worse?) as well: 5,000/10,000 SHA-1 cycles have been added. EDPR will be updated accordingly to support new format (you can subscribe to our mailing list to be notified), of course, but don’t expect the high recovery speed: we can get several hundred passwords per second only. For older versions of Notes, the speed was ~100,000 passwords per second or higher.

WPA Benchmark

Monday, April 6th, 2009

Here are the benchmarks for WPA recovery; we’ve run tests on one of the most powerful modern CPUs and a bunch of GPUs. Even GTX 280 outperformed Core 2 Quad Q6600:

wpa_benchmark2

Password Recovery Tambourine

Wednesday, April 1st, 2009

Today morning ElcomSoft announced a new tool for password recovery. This one is a hardware, a supernatural amulet of Siberian shamans. Password Recovery Tambourine appears in 4 editions: Pentagon, Glamourous, Russian and Open Source. This hardware requires a special 15-month training with authentic Yakutsk shaman guild. However, if you are patient enough to spend a year and a half in Siberia and not afraid of permanent frost there, then after the training no password would be strong enough for you. You’ll crack it in seconds with your preferable edition of Password Recovery Tambourine. Cultural note The idea of creating Password Recovery Tambourine grew out of the popular belief between Russian system administrators that when nothing else helps you have to rest your hopes on dancing with a ‘BU-BEN (Russian for ‘tambourine’). They say, dancing with a tambourine helps to reanimate one’s server, find bugs, set up operational system and what not. Implementation of this belief to password recovery was not easy, at least 200 ritual dances have been performed during the development stage. Finally,

ElcomSoft is proud to announce that the ultimate tool to recover lost passwords that cannot be recovered it in a traditional way has emerged.

Shaman

EFS-Encrypted Data Recovery

Tuesday, March 31st, 2009

The Encrypting File System (EFS) was first introduced in Windows 2000 and, as Microsoft claims, is an excellent encryption system with no back door.

However, the most secure encryption can be ambiguous. It would efficiently prevent hackers and other illegal intruders from breaking into your system and getting access to your well-encrypted data. The other side of the coin is that both a regular user and a seasoned administrator can lose important data due to unforeseen circumstances. It is also the case with EFS.

Check out the success story on how EFS-encrypted data can be recovered (the PDF is 81 Kbyte) with Advanced EFS Data Recovery.