There is a bit of confusion about our software designed to allow breaking into password-protected systems, files, documents, and encrypted containers. We have as many as three products (and five different tools) dealing with the matter: Elcomsoft Forensic Disk Decryptor (with an unnamed memory dumping tool), Elcomsoft System Recovery and Elcomsoft Distributed Password Recovery, which also includes Elcomsoft Hash Extractor as part of the package. Let’s briefly go through all of them. Hopefully it will help you select the right product for your needs and save time in your investigation.
Elcomsoft System Recovery (ESR) consists of a bootable flash drive with pre-configured Windows PE environment and the System Recovery tool itself. The distributive you receive includes everything to make that flash drive.
What do you use it for? Elcomsoft System Recovery helps you boot a live system from a flash drive and do the following:
In other words, ESR is for those situations where you have a live system (not a ‘cold’ hard drive or disk image) and don’t have much time. ESR is the perfect tool to help you ignite your investigation.
Unlike ESR, Elcomsoft Forensic Disk Decryptor deals with cold hard drives or disk images if those are encrypted (or have encrypted partitions). VeraCrypt, BitLocker, TrueCrypt and other encrypted containers all fall into this department. To make matters more interesting, EFDD comes with an unnamed memory dumping tool which *is* to run on live systems and *not* on cold drives or disk images.
Use Elcomsoft Forensic Disk Decryptor for:
Use the unnamed RAM capturing tool for:
It may be simple at the first glance: as the name implies, you use Elcomsoft Distributed Password Recovery for running hardware-accelerated brute-force, dictionary or hybrid attacks on the password (and sometimes on the encryption key) for several hundred formats. The “Distributed” part means you can use several thousand computers or cloud instances to perform the attack.
Sounds simple? Not so fast. Elcomsoft Distributed Password Recovery comes with a tool named Elcomsoft Hash Extractor. This tool (for sanity, let’s just call it EHE) can extract hash values and encryption metadata from a handful of file formats including office documents, password manager databases and, in near future, compressed archives. You can then use the encryption metadata instead of the original file or document to run the attack in EDPR. Why would you want to do that? One word: privacy. Attacking a small, anonymous hash instead of the raw document helps conform with local data protection laws, especially if you are sub-contracting password recovery or are using remote servers or cloud instances.
Use Elcomsoft Hash Extractor for:
Think that was a bit complicated? Let me tell you that Elcomsoft Distributed Password Recovery includes a trimmed down version of Elcomsoft Forensic Disk Decryptor, and we’ll call it a day.
Use the included, stripped-down version of Elcomsoft Forensic Disk Decryptor for:
For anything above and beyond, you’ll need the full, unrestricted version of Elcomsoft Forensic Disk Decryptor that is available as a separate purchase or part of Elcomsoft Desktop Forensic Bundle or Elcomsoft Premium Forensic Bundle.
Finally, use Elcomsoft Distributed Password Recovery for:
And this is what you cannot use Elcomsoft Distributed Password Recovery for:
Finally, the iffy part:
Build high-performance clusters for breaking passwords faster. Elcomsoft Distributed Password Recovery offers zero-overhead scalability and supports GPU acceleration for faster recovery. Serving forensic experts and government agencies, data recovery services and corporations, Elcomsoft Distributed Password Recovery is here to break the most complex passwords and strong encryption keys within realistic timeframes.
Elcomsoft Distributed Password Recovery official web page & downloads »
Elcomsoft Forensic Disk Decryptor offers forensic specialists an easy way to obtain complete real-time access to information stored in popular crypto containers. Supporting desktop and portable versions of BitLocker, FileVault 2, PGP Disk, TrueCrypt and VeraCrypt protection, the tool can decrypt all files and folders stored in crypto containers or mount encrypted volumes as new drive letters for instant, real-time access.
Elcomsoft Forensic Disk Decryptor official web page & downloads »
Reset passwords to local Windows accounts and Microsoft Account and perform a wide range of administrative tasks. Assign administrative privileges to any user account, reset expired passwords or export password hashes for offline recovery, and create forensic disk images. Elcomsoft System Recovery is ready to boot thanks to the licensed Windows PE environment, allowing administrators to access locked computers.