视频

新闻

产品白皮书

"Secure Password Managers" and "Military-Grade Encryption" on Smartphones: Oh, Really?.

Paper we will analyze applications designed to facilitate storing and management of passwords on mobile platforms, such as Apple iOS and BlackBerry. We will specifically focus our attention on the security of data at rest. We will show that many password keeper apps fail to provide claimed level of protection.

Open Sesame!.

The easy way to restore access passwords to files, applications and databases.

An effective approach to restoring system access in Windows.

The easy way to restore access passwords to files, applications and databases.

Proactive is better than reactive.

Testing password safety – a key to securing a corporate network.

Advantages and disadvantages of EFS and effective recovery of encrypted data

The easy way to restore access passwords to files, applications and databases.

Unlocking PDF

The easy way to restore access passwords to files, applications and databases.

Size does matter

Advantages of distributed password recovery.

ElcomSoft Solutions

in the corporate information security environment.

相关书籍

Overall security & encryption topics and tutorials
Windows login passwords, AEFSDR
Elcomsoft Distributed Password Recovery
Advanced EFS Data Recovery, Elcomsoft Distributed Password Recovery, PGP
MS Office password
Elcomsoft Distributed Password Recovery, GPU
Advanced EFS Data Recovery

关于我们的文章

What if a forensic expert gets a locked iPhone from a crime scene? Yeah, details should be drawn out from the device to throw light on the misdeed. But with the Cupertino company patching up the vulnerabilities with each firmware overhaul, intruding into the OS is a bit far-fetched. Wait what! Elcomsoft, a mobile forensic tools developing company has found a way...

checkra1n opens up new window to iOS forensics, but passcode recovery not yet possible

4 December, 2019PiunikaWeb

Elcomsoft has updated iOS Forensic Toolkit, its mobile forensic tool for extracting data from a range of Apple devices. Version 5.20 adds the ability to extract the file system and decrypt the keychain from select Apple devices running all versions of iOS from iOS 12 to iOS 13.3.

https://www.mactech.com/2019/12/02/ios-forensic-toolkit-upgraded-to-version-5-20/

2 December, 2019MacTech

For forensic investigators, access to Health data can provide additional useful evidence, including records of heart rate, sleeping habits, location points, workouts, steps, and walking routines.

Elcomsoft forensic tools can now extract Apple Health data from iCloud

9 January, 2019iLounge

发布会

Breaking Health Clouds

The amount of data collected by health trackers is amazing: from step count and heart rate to running and walking distances with exact timestamps and lots of geolocation data. Some of it goes directly to Apple Health and then to Apple iCloud, while other manufacturers (Samsung or FitBit) keep data in their own clouds. Something goes to Google Fit. Apart from privacy issues, think of how much data can serve as essential evidence during investigations.

PDF
Overall security & encryption topics and tutorials

Learn more about Apple iCloud backups, FindMyPhone, document storage, keychain, Windows Live SMS, mail, notes, and BlackBerry 10 backup encryption

PDF
Cracking and Analyzing Apple iCloud backups, Find My iPhone, Document Storage

Apple iCloud was meant to improve flexibility and comfort when using your iDevices, however it also provides opportunities to extract as much as everything about the user.

PDF 视频
How To Hack WPA/WPA2 Internet

In this video you caan see a step-by-step demonstration how to crack WPA/WPA2 encryption in Windows environment using Elcomsoft Wireless Security Auditor (v.2).

视频
When Two-Factor Authentication Is A Foe: Breaking Apple's iCloud Keychain

Vladimir Katalov explains what mobile data is synced in cloud services and how, and dwells on two-factor authentication.

视频
All Wireless Security Is Now Broken

Tcat House speaks about Elcomsoft Distributed Password Recovery that pioneered in implementing advanced technologies of using parallel processing capabilities of GPUs and multi-CPUs available, as well as linear scalability to reach “the screaming performance” in the recovery of WPA/WPA2-PSK passwords, which are no longer acceptable as a stand-alone defense.

视频
Hacking Wireless Networks Made Easy

In The FrugalTech Show Bruce Naylor speaks about Elcomsoft Wireless Security Auditor (v.1.0) which can bust Wi-Fi encryption keys very quickly using commonly availably graphic cards and thus making a supercomputer out of a normal pc. He strongly urges that wireless security practices are essential for today’s users and Elcomsoft Wireless Security Auditor can help in it.

视频
Advanced Smartphone Forensics

In this talk Vladimir Katalov covers iCloud backups, FindMyPhone service, storage and keychain (as of 2014).

视频
iOS Acquisition Methods Compared

The talk covers different iOS acquisition methods, such as physical, logical or cloud data acquisitions. The talk gives comparison and evolution of data acquisition methods. Presented at Hacktivity conference in 2016.

视频

实例分享

我们的徽标,条幅和其他图形