Intelligent Load Balancing: Optimizing Password Recovery Across Heterogeneous Units

November 14th, 2024 by Oleg Afonin

In the latest update of Elcomsoft Distributed Password Recovery (EDPR), we’ve introduced a revamped load-balancing feature. The new feature aims to enhance resource utilization on local workstations across diverse hardware configurations. This update has drastically reduced the time required to break passwords in certain hardware configurations, thanks to a refined load distribution algorithm. In this article, we’ll share some technical details on how load balancing leverages a mix of GPUs and CPU cores.

Read the rest of this entry »

iOS Extraction Without a Jailbreak: iOS 9 through iOS 13.7 on All Devices

December 3rd, 2020 by Vladimir Katalov

After adding jailbreak-free extraction for iOS 13.5.1 through 13.7, we now support every Apple device running any version of iOS from 9.0 through 13.7 with no gaps or exclusions. For the first time, full file system extraction and keychain decryption are possible on all devices running these iOS versions.

Read the rest of this entry »

Elcomsoft vs. Hashcat Part 3: Attacks, Costs, Performance and Extra Features

December 2nd, 2020 by Andrey Malyshev

Elcomsoft Distributed Password Recovery and Hashcat support a number of different attacks ranging from brute-force all the way to scriptable, dictionary-based attacks. The costs and performance are extremely important factors. We charge several hundred dollars for what, in the end, can be done with a free tool. Which tool has better performance, and are the extra features worth the price premium? Let’s check it out.

Read the rest of this entry »

The ABC’s of Password Cracking: The True Meaning of Speed

November 30th, 2020 by Oleg Afonin

When adding a new encryption format or comparing the performance of different password recovery tools, we routinely quote the recovery speed expressed in the number of passwords per second. But what is the true meaning of password recovery speeds? Do the speeds depend solely, or at all, on the encryption algorithm? What’s “military grade” encryption, and does it guarantee the security of your data? And why on Earth breaking AES-256 encryption takes so vastly different effort in different file formats? Read along to find out.

Read the rest of this entry »

Elcomsoft System Recovery: a Swiss Army Knife of Desktop Forensics

November 26th, 2020 by Oleg Afonin

Accessing a locked system is always a challenge. Encrypted disks and encrypted virtual machines, encrypted files and passwords are just a few things to mention. In this article we are proposing a straightforward workflow for investigating computers in the field.

Read the rest of this entry »

Elcomsoft vs. Hashcat Part 2: Workflow, Distributed and Cloud Attacks

November 25th, 2020 by Oleg Afonin

The user interface is a major advantage of Elcomsoft tools. Setting up attacks in Elcomsoft Distributed Password Recovery is simpler and more straightforward compared to the command-line tool. In this article, we’ll talk about the general workflow, the use and configuration of distributed and cloud attacks in both products.

Read the rest of this entry »

Elcomsoft vs. Hashcat: Addressing Feedback

November 25th, 2020 by Oleg Afonin

After publishing the first article in the series, we received numerous comments challenging our claims. We carefully reviewed every comment, reread and reevaluated our original article.  Elcomsoft vs. Hashcat Rev.1.1 is here.

Read the rest of this entry »

Extracting Evidence from iPhone Devices: Do I (Still) Need a Jailbreak?

November 23rd, 2020 by Vladimir Katalov

If you are familiar with iOS acquisition methods, you know that the best results can be obtained with a full file system acquisition. However, extracting the file system may require jailbreaking, which may be risky and not always permitted. Are there any reasons to use jailbreaks for extracting evidence from Apple devices?

Read the rest of this entry »

Elcomsoft vs. Hashcat Part 1: Hardware Acceleration, Supported Formats and Initial Configuration

November 18th, 2020 by Oleg Afonin

Hashcat is a great, free tool competing head to head with the tools we make. We charge several hundred dollars for what, in the end, can be done with a free tool. What are the reasons for our customers to choose ElcomSoft products instead of Hashcat, and is the expense justified? We did our best to compare the two tools to help you make the informed decision.

Read the rest of this entry »

Mobile Forensics – Advanced Investigative Strategies

November 16th, 2020 by Vladimir Katalov

Four years ago, we published our first book: Mobile Forensics – Advanced Investigative Strategies. We are really proud of this achievement. Do you want to know the story behind it and what’s changed since then in mobile and cloud forensics? Here are some insides (but please do not tell anyone!)

Read the rest of this entry »

Apple Watch Forensics Reloaded

November 13th, 2020 by Vladimir Katalov

Is it possible to extract any data from an Apple Watch? It’s relatively easy if you have access to the iPhone the device is paired to, or if you have a backup of that iPhone. But what if the watch is all you have? If there is no paired iPhone, no backup and no iCloud credentials, how can you connect the Apple Watch to the computer, and can you backup the watch?

Read the rest of this entry »