:- COVID-19 -: 

 All items entering and leaving our premises are disinfected using short-wave germicidal ultraviolet (UVC) radiation.

a b c d e f g h i j k l m n o p q r s t u v w x y z #

Password Cracking, Extraction, Resetting and Recovery

Hardware-accelerated password recovery from more than 280 popular file types, including:

MS Office (Outlook, Word, Excel), PDF, Zip and RAR, QuickBooks, FileMaker, Lotus Notes, Bitcoin wallets, Apple iTunes Backup, Mac OS X Keychain, password managers and most other popular applications.

Distributed password recovery using a bank of multi GPU workstations, working in unison, with a total of 65 graphical processing units (GPU's), we can attack passwords, at an average speed of 1.1 billion passwords per hour, using a combination of different methods including:

  • Dictionary attack - Using a dictionary with 3.2 billion words, phrases and commonly used passwords attacked at approx. 1.2 billion passwords per hour - can be expanded to use different language dictionaries and industry-specific terms etc.
  • Brute-force attack – Specifying different password lengths and formats attacked at approx. 1.1 billion passwords per hour e.g. 6-8 characters, using a combination of lower and uppercase including numerics etc.
  • Mixed attacks using a combination of dictionary passwords and brute-force e.g. my456password, mypassword456, 456mypassword, My456Password etc.
  • Keyword list attack - If the length and format of the password is “known” using a combination of a keyword list and brute-force similar to mixed attacks.

The attack duration is dependant on what is know about the password.

Memory image analysis

We can extract passwords (file passwords, account login details etc.) and decryption keys (FileVault2, TrueCrypt, VeraCrypt, BitLocker etc.) from live system memory (RAM) and page and hibernation files (Pagefile.sys and Hybernation.sys).

Do not shut down or reboot the machine(s) for the best possible chance of recovery.

Mobile device password recovery

We can recover passwords from many Apple iPhone/iPad, Android and Windows phone backups and physical images.

Trusted Platform Module (TPM)

Recovery of Bitlocker passwords from TPM (firmware) protected storage devices.

Decryption of FDE

We can, in some cases, recover passwords and then decrypt BitLocker, FileVault2, APFS, TrueCrypt, VeraCrypt, LUKS, McAfee, Apple DMG, Symantec and PGP disk images.

Password Recovery and Removal From Personal Computers (PC's) and Servers

Resetting local user and domain passwords and extraction of passwords from Windows/Unix/Mac hashes.

7-Zip Archive

7-Zip Archive

  • File Extension: 7Z
ACT! by Sage 2005

ACT! by Sage 2005

  • File Extension: ADF
ACT! by Sage 2006

ACT! by Sage 2006

  • File Extension: ADF
ACT! by Sage 2007

ACT! by Sage 2007

  • File Extension: ADF
ACT! by Sage 2008

ACT! by Sage 2008

  • File Extension: ADF
ACT! by Sage 2009

ACT! by Sage 2009

  • File Extension: ADF
Adobe  Acrobat 3.0

Adobe Acrobat 3.0

  • File Extension: PDF
Adobe  Acrobat 4.0

Adobe Acrobat 4.0

  • File Extension: PDF
Adobe  Acrobat 5.0

Adobe Acrobat 5.0

  • File Extension: PDF
Adobe  Acrobat 6.0

Adobe Acrobat 6.0

  • File Extension: PDF
Adobe Acrobat 10.0

Adobe Acrobat 10.0

  • File Extension: PDF
Adobe Acrobat 11.0

Adobe Acrobat 11.0

  • File Extension: PDF
Adobe Acrobat 7.0

Adobe Acrobat 7.0

  • File Extension: PDF
Adobe Acrobat 8.0

Adobe Acrobat 8.0

  • File Extension: PDF
Adobe Acrobat 9.0

Adobe Acrobat 9.0

  • File Extension: PDF
Apple File System (APFS)

Apple File System (APFS)

  • File Extension: DMG, DD, IMG, BIN, E01
BestCrypt 6.0

BestCrypt 6.0

  • File Extension: JBC
BestCrypt 7.0

BestCrypt 7.0

  • File Extension: JBC
[12 3 4 5  >>