Installing and Troubleshooting the Extraction Agent (2025)

July 2nd, 2025 by Oleg Afonin

Over the years, we’ve published numerous guides on installing the iOS Forensic Toolkit extraction agent and troubleshooting issues. As both the tool and its environment evolved, so did our documentation – often leading to outdated or scattered information. This article consolidates and updates everything in one place, detailing the correct installation and troubleshooting procedures.

Read the rest of this entry »

More on SLI

May 13th, 2009 by Vladimir Katalov

If you are going to purchase a new computer (or make it yourself), you should definitely think about graphics — for CAD/CAM, gaming, searching for extraterrestrial intelligence at home or password cracking. Of course, thinking of budget, too. I hope you’re already aware of NVIDIA SLI which allows to use multiple video cards, but how a single dual-GPU compares to two single-GPU ones? Read GeForce GTX 295 Vs. GTX 275 SLI: When Two Are Better Than One.

Read the rest of this entry »

Password-related news

May 12th, 2009 by Vladimir Katalov

There is a few, so I’ll put ’em all into a single blog post 🙂

Read the rest of this entry »

Hard disk recovery

May 12th, 2009 by Vladimir Katalov

Highly recommended: Burned, Dropped, Drowned: HDD Recovery In Pictures. I hope that you will not encounter into such situations, though :).

Read the rest of this entry »

DC4420

May 12th, 2009 by Vladimir Katalov

Apart from official IT Security events, London ethical hackers like to organize monthly meetings such as DC4420 in clubs, sometimes changing their location. In an informal manner they exchange their experience, represent new ideas and technologies.

Read the rest of this entry »

Green password policy? No re-use!

May 10th, 2009 by Olga Koksharova

Do you still reuse passwords? The recent study from University of California shows again that such a bad habit continues to exist. The worst thing about reusing passwords is that it doesn’t require being a technically skilled hacker to guess your password for this or that document.  

Read the rest of this entry »

What does “The only way to break into PGP” mean?

April 30th, 2009 by Vladimir Katalov

Note to PGP legal dept: I’m not going to put the ® sign every time when I mention PGP. I’m just tired; we already did that in our press release and on our web site, and I think it’s enough. No, really? Well, I’ll repeat one more time: all names like PGP are trademarks or registered trademarks of their respective owners in the UK, USA, Russia and probably somewhere else  e.g. in Albania. There are too many countries to mention, sorry :). Why should I care about (R)? Keep reading, and you’ll see the reason.

Read the rest of this entry »

On the Infosec once again

April 30th, 2009 by Andrey Belenko

There is a lot of speculation about what has happened between Elcomsoft and PGP here on Infosecurity Europe 2009 in London, so I would like to share my own point of view which may or may not coincide with Elcomsoft’s.

Read the rest of this entry »

From InfoSecurity, “the number One in Europe”

April 28th, 2009 by Vladimir Katalov

We never thought that our participation would bring such kind of trouble (or at least a disappointment).

Read the rest of this entry »

GPU Assisted Password Cracking at Troopers 2009

April 28th, 2009 by Katerina Korolkova, Direktur Humas

Last week a colleague of mine, Andrey Belenko, gave a speech at the Troopers conference in Munich. Olga wrote about it in this blog. All the talks at Troopers were awesome. Soon the videos and slide shows will be available for downloading on Troopers website.

Read the rest of this entry »