Intelligent Load Balancing: Optimizing Password Recovery Across Heterogeneous Units

November 14th, 2024 by Oleg Afonin

In the latest update of Elcomsoft Distributed Password Recovery (EDPR), we’ve introduced a revamped load-balancing feature. The new feature aims to enhance resource utilization on local workstations across diverse hardware configurations. This update has drastically reduced the time required to break passwords in certain hardware configurations, thanks to a refined load distribution algorithm. In this article, we’ll share some technical details on how load balancing leverages a mix of GPUs and CPU cores.

Read the rest of this entry »

Digging Mac OS Keychains

September 16th, 2015 by Vladimir Katalov

We have just released a brand new tool, and this time it’s not about mobile forensics. Or is it?

Read the rest of this entry »

BlackBerry Password Keeper Escrow Key: Have We Just Found a Hidden Backdoor?

August 11th, 2015 by Vladimir Katalov

As you may already know from the official press release, we’ve recently updated Elcomsoft Phone Breaker to version 4.10. From that release, you could learn that the updated version of the tool targets passwords managers, adding the ability to instantly decrypt passwords stored in BlackBerry Password Keeper for BlackBerry 10 and attack 1Password containers.

Read the rest of this entry »

Video Tutorial on Decryption of Windows EFS-encrypted Data

July 6th, 2015 by Olga Koksharova

Although we’ve already embraced the EFS-encryption/decryption in some of our white papers and case studies, now we’d like to share a video tutorial because seeing once is better than hearing reading twice. So, in this video you will see how to decrypt EFS-encrypted data with help of Advanced EFS Data Recovery and how to recover Windows user account password with Proactive System Password Recovery (because it’s still obligatory for this type of encryption).

Read the rest of this entry »

Why Do We Need Physical Acquisition?

June 25th, 2015 by Vladimir Katalov

With all the trouble of jailbreaking iOS 8 devices and the lack of support for 64-bit hardware, does iOS physical acquisition still present meaningful benefits to the investigator? Is it still worth your time and effort attempting to acquire that iPhone via a Lightning cord?

Read the rest of this entry »

Elcomsoft Forensic Disk Decryptor Video Tutorial

June 8th, 2015 by Olga Koksharova

Quite often our new customers ask us for advice about what they should start with in order to use the program effectively. In fact, there are various situations when the tool can come in handy by decrypting data securely protected with TrueCrypt, BitLocker (To-Go), or PGP and we’d need a super long video to describe all the cases. But we’d love to demonstrate one typical situation when disk is protected with TrueCrypt when entire system drive encryption option is on.

Read the rest of this entry »

Elcomsoft Phone Viewer: Faster and Easier

May 19th, 2015 by Vladimir Katalov

As you may already know, we have just updated our recently released forensic tool, Elcomsoft Phone Viewer. The update received a major performance boost and numerous usability enhancements.

Read the rest of this entry »

Elcomsoft Wireless Security Auditor Video Tutorial

April 30th, 2015 by Olga Koksharova

I know most computer gurus and pros never read through program manuals or help files and prefer to learn everything using proverbial method of trial and error. Does this sound like you? Of course. Exceptions are very seldom. So, here’s something nice that will save your time and help your experience with Elcomsoft Wireless Security Auditor (EWSA).

Read the rest of this entry »