a b c d e f g h i j k l m n o p q r s t u v w x y z #

Password Cracking, Extraction, Resetting and Recovery

Hardware-accelerated password recovery from more than 280 popular file types, including:

MS Office (Outlook, Word, Excel), PDF, Zip and RAR, QuickBooks, FileMaker, Lotus Notes, Bitcoin wallets, Apple iTunes Backup, Mac OS X Keychain, password managers and most other popular applications.

Distributed password recovery using a bank of multi GPU workstations, working in unison, with a total of 65 graphical processing units (GPU's), we can attack passwords, at an average speed of 1.1 billion passwords per hour, using a combination of different methods including:

  • Dictionary attack - Using a dictionary with 3.2 billion words, phrases and commonly used passwords attacked at approx. 1.2 billion passwords per hour - can be expanded to use different language dictionaries and industry-specific terms etc.
  • Brute-force attack – Specifying different password lengths and formats attacked at approx. 1.1 billion passwords per hour e.g. 6-8 characters, using a combination of lower and uppercase including numerics etc.
  • Mixed attacks using a combination of dictionary passwords and brute-force e.g. my456password, mypassword456, 456mypassword, My456Password etc.
  • Keyword list attack - If the length and format of the password is “known” using a combination of a keyword list and brute-force similar to mixed attacks.

The attack duration is dependant on what is know about the password.

Memory image analysis

We can extract passwords (file passwords, account login details etc.) and decryption keys (FileVault2, TrueCrypt, VeraCrypt, BitLocker etc.) from live system memory (RAM) and page and hibernation files (Pagefile.sys and Hybernation.sys).

Do not shut down or reboot the machine(s) for the best possible chance of recovery.

Mobile device password recovery

We can recover passwords from many Apple iPhone/iPad, Android and Windows phone backups and physical images.

Trusted Platform Module (TPM)

Recovery of Bitlocker passwords from TPM (firmware) protected storage devices.

Decryption of FDE

We can, in some cases, recover passwords and then decrypt BitLocker, FileVault2, APFS, TrueCrypt, VeraCrypt, LUKS, McAfee, Apple DMG, Symantec and PGP disk images.

Password Recovery and Removal From Personal Computers (PC's) and Servers

Resetting local user and domain passwords and extraction of passwords from Windows/Unix/Mac hashes.

ICQ 99a

ICQ 99a

  • File Extension: DAT
ICQ Lite

ICQ Lite

  • File Extension: FB
KeePass

KeePass

  • File Extension: KDB, KDBX
Lotus 1-2-3 1.1+

Lotus 1-2-3 1.1+

  • File Extension: WK!, WK1, WK4, WRC, WR1, WR9, 123
Lotus Notes 4.x

Lotus Notes 4.x

  • File Extension: ID
Lotus Notes 6.x

Lotus Notes 6.x

  • File Extension: ID
Lotus Notes 7.0

Lotus Notes 7.0

  • File Extension: ID
Lotus Notes 8.0

Lotus Notes 8.0

  • File Extension: ID
Lotus Organizer 1.0

Lotus Organizer 1.0

  • File Extension: ORG
Lotus Organizer 2.0

Lotus Organizer 2.0

  • File Extension: OR2
Lotus Organizer 3.0

Lotus Organizer 3.0

  • File Extension: OR3
Lotus Organizer 4.0

Lotus Organizer 4.0

  • File Extension: OR4
Lotus Organizer 5.0

Lotus Organizer 5.0

  • File Extension: OR5
Lotus Organizer 6.0

Lotus Organizer 6.0

  • File Extension: OR6
Lotus Word Pro 96 - 99

Lotus Word Pro 96 - 99

  • File Extension: LWP
LUKS Disk Image

LUKS Disk Image

  • File Extension: DD, IMG, BIN, E01
Mac OS / FileVault2

Mac OS / FileVault2

  • File Extension: DMG, DD, IMG, BIN, E01
<<  1 2 [34 5 6 7  >>