a b c d e f g h i j k l m n o p q r s t u v w x y z #

Password Cracking, Extraction, Resetting and Recovery

Hardware-accelerated password recovery from more than 280 popular file types, including:

MS Office (Outlook, Word, Excel), PDF, Zip and RAR, QuickBooks, FileMaker, Lotus Notes, Bitcoin wallets, Apple iTunes Backup, Mac OS X Keychain, password managers and most other popular applications.

Distributed password recovery using a bank of multi GPU workstations, working in unison, with a total of 65 graphical processing units (GPU's), we can attack passwords, at an average speed of 1.1 billion passwords per hour, using a combination of different methods including:

  • Dictionary attack - Using a dictionary with 3.2 billion words, phrases and commonly used passwords attacked at approx. 1.2 billion passwords per hour - can be expanded to use different language dictionaries and industry-specific terms etc.
  • Brute-force attack – Specifying different password lengths and formats attacked at approx. 1.1 billion passwords per hour e.g. 6-8 characters, using a combination of lower and uppercase including numerics etc.
  • Mixed attacks using a combination of dictionary passwords and brute-force e.g. my456password, mypassword456, 456mypassword, My456Password etc.
  • Keyword list attack - If the length and format of the password is “known” using a combination of a keyword list and brute-force similar to mixed attacks.

The attack duration is dependant on what is know about the password.

Memory image analysis

We can extract passwords (file passwords, account login details etc.) and decryption keys (FileVault2, TrueCrypt, VeraCrypt, BitLocker etc.) from live system memory (RAM) and page and hibernation files (Pagefile.sys and Hybernation.sys).

Do not shut down or reboot the machine(s) for the best possible chance of recovery.

Mobile device password recovery

We can recover passwords from many Apple iPhone/iPad, Android and Windows phone backups and physical images.

Trusted Platform Module (TPM)

Recovery of Bitlocker passwords from TPM (firmware) protected storage devices.

Decryption of FDE

We can, in some cases, recover passwords and then decrypt BitLocker, FileVault2, APFS, TrueCrypt, VeraCrypt, LUKS, McAfee, Apple DMG, Symantec and PGP disk images.

Password Recovery and Removal From Personal Computers (PC's) and Servers

Resetting local user and domain passwords and extraction of passwords from Windows/Unix/Mac hashes.

DriveCrypt

DriveCrypt

  • File Extension: DVC, DRC
FileMaker Pro 10.0

FileMaker Pro 10.0

  • File Extension: FP7
FileMaker Pro 11.0

FileMaker Pro 11.0

  • File Extension: FP7
FileMaker Pro 12.0

FileMaker Pro 12.0

  • File Extension: FP7, FMP12
FileMaker Pro 13.0

FileMaker Pro 13.0

  • File Extension: FMP12
FileMaker Pro 14.0

FileMaker Pro 14.0

  • File Extension: FMP12
FileMaker Pro 3.0

FileMaker Pro 3.0

  • File Extension: FP3
FileMaker Pro 4.0

FileMaker Pro 4.0

  • File Extension: FP3
FileMaker Pro 5.0

FileMaker Pro 5.0

  • File Extension: FP5
FileMaker Pro 6.0

FileMaker Pro 6.0

  • File Extension: FP5
FileMaker Pro 7.0

FileMaker Pro 7.0

  • File Extension: FP7
FileMaker Pro 8.x

FileMaker Pro 8.x

  • File Extension: FP7
FileMaker Pro 9.0

FileMaker Pro 9.0

  • File Extension: FP7
GnuPG Private Keyring

GnuPG Private Keyring

  • File Extension: GPG
<<  1 [23 4 5 6  >>