Agent-based full file system and keychain extraction: now up to iOS 14.8 (incl.)

January 13th, 2022 by Oleg Afonin

iOS Forensic Toolkit 7.10 brings low-level file system extraction support for a bunch of iOS versions. This includes the entire range of iPhone models based on the A11, A12, and A13 Bionic platforms running iOS 14.4 through 14.8.

Read the rest of this entry »

Targeting Backup Encryption: Acronis, Macrium, and Veeam

January 6th, 2022 by Oleg Afonin

Windows backups are rarely targeted during investigations, yet they can be the only available source of evidence if the suspect’s computer is locked and encrypted. There are multiple third-part backup tools for Windows, and most of them have password protection as an option. We are adding the ability to break password protection of popular backup tools: Acronis True Image, Macrium Reflect, and Veeam.

Read the rest of this entry »

Season’s Greetings and 2021 in Review

December 30th, 2021 by Olga Koksharova

The new year is just around the corner, and so it’s the right time to review our achievements in 2021. We’ve done plenty of researching, developing and updating, and posted a great deal of content in our blog. Let’s run through the most exciting developments of the year!

Read the rest of this entry »

Breaking BestCrypt Volume Encryption 5

December 28th, 2021 by Oleg Afonin

BestCrypt, developed by the Finnish company Jetico, is a cross-platform commercial disk encryption tool directly competing with BitLocker, FileVault 2 and VeraCrypt. Volume encryption is available for Windows and macOS. Learn how to break BestCrypt full-disk encryption by recovering the original password!

Read the rest of this entry »

Digital Evidence in Encrypted Backups

December 27th, 2021 by Vladimir Katalov

Backups are the primary way to preserve data. On smartphones, backups are handled automatically by the OS. Windows lacks a convincing backup app; numerous third-party tools are available, some of which feature strong encryption. Computer backups may contain valuable evidence that can be useful during an investigation – if you can do something about the password.

Read the rest of this entry »

Checkm8 Based Extraction of iPhone 7 and iPhone 7 Plus

December 22nd, 2021 by Oleg Afonin

Last month we introduced forensically sound low-level extraction for a range of iPhone devices. Based on the renowned checkm8 exploit, our solution supported devices ranging from the iPhone 5s through 6s/6s Plus/SE. Today, we are extending the range of supported devices, adding checkm8 extraction of the iPhone 7 and 7 Plus.

Read the rest of this entry »

Microsoft Office 40-bit Encryption and Thunder Tables in Advanced Office Password Recovery

December 20th, 2021 by Oleg Afonin

Before the end of this year, we are releasing one last update. Advanced Office Password Recovery can now break 40-bit encryption in Microsoft Office documents, and gains support for Thunder Tables. What are Thunder Tables exactly, and is 40-bit encryption still relevant? Read along to find out.

Read the rest of this entry »

WhatsApp Explorer: End-to-End Encrypted Backups and Compatibility Improvements

December 16th, 2021 by Oleg Afonin

WhatsApp is the fastest growing instant messenger app. With over 2 billion monthly users, WhatsApp keeps the crown of the most popular instant messaging tool in the Western hemisphere. The recent introduction of end-to-end encrypted backups and the change of Google’s authentication protocol broke things temporarily for EXWA users, but now everything is back to normal. Learn how Elcomsoft Explorer for WhatsApp can download and decrypt encrypted WhatsApp communication histories from Google Drive and Apple iCloud!

Read the rest of this entry »

More on checkm8 and USB Hubs, Upcoming iPhone 7 Support

December 14th, 2021 by Elcomsoft R&D

Installing the checkm8 exploit to perform forensically sound extractions with iOS Forensic Toolkit can be tricky, which is in part due to certain hardware peculiarities.  If you watch our blog, you might have already read the article on checkm8, checkra1n and USB hubs. We have some good news: we managed to fix some of the issues with or without the use of a USB hub.

Read the rest of this entry »

Worthless Security Practices

December 1st, 2021 by Oleg Afonin

Many security practices still widely accepted today are things of the past. Many of them made sense at the time of short passwords and unrestricted access to workplaces, while some were learned from TV shows with “Russian hackers” breaking Pentagon. In this article we’ll sort it out.

Read the rest of this entry »