Jump to content

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. If you already have an account, login here - otherwise create an account for free today!

Search the Community

Showing results for tags 'Elcomsoft'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Crackians
    • Rules & Announcements
    • Forum Donation
    • Feedback and Suggestions
    • Staff Applications and Information
    • Support
    • Giveaways
  • General & Off Topic Discussion
    • Lounge
    • Gaming
    • Crypto Currencies
    • Entertainment
    • Personal Life
    • Achievements and Bragging
    • Graphics
    • Site Bugs
  • Cracking Zone
    • Tutorials, Guides, etc.
    • Cracking Tools
    • Configs
    • ComboLists
    • Proxies
    • Dumps / Databases
    • Keywords
  • VIP Zone
    • Premium Accounts
    • Config
    • Combo
    • Proxies
    • Tools
    • Requests
    • Carding Zone
    • Premium Leaks
    • Premium Ebooks
  • Free Accounts
    • Premium Accounts
    • Account Requests
  • Staff Zone
    • Crackians Staff Private Accounts Section
    • Crackians Staff Private Section
    • Crackians Staff Support & Requests
  • Carding Zone
  • Leaks
  • Hacking
  • Money
  • Coding and Programming
  • Reverse Engineering
  • Marketplace
  • Graveyard

Product Groups

  • BUY advertisement
  • Private Lessons
  • Ebooks

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 15 results

  1. Elcomsoft Phone Breaker Forensic Edition 9.65.37980 | File Size: 83.1 MB Perform logical and over-the-air acquisition of iOS, Windows Phone 8/8.1, Windows 10 Mobile and BlackBerry 10 devices, break into encrypted backups, obtain and analyze information from Apple iCloud. Break passwords and decrypt iOS backups with GPU acceleration Decrypt iCloud Keychain and Messages with media files and documents from iCloud Obtain synchronized data from Apple and Microsoft accounts Download iCloud backups and synced data with or without Apple ID password Cloud Acquisition via Apple iCloud and Microsoft Account Cloud acquisition is a highly effective way of retrieving up-to-date information backed up or synced by modern smartphones with their respective cloud services. Elcomsoft Phone Breaker supports the extraction of cloud backups and synced data from Apple iCloud and Microsoft Account, enabling remote acquisition of iPhone and iPad devices as well as Windows devices, Skype and other Microsoft software. Online backups and synchronized data can be acquired by forensic specialists without having the original iOS device in hands. All that's needed to access online data stored in the cloud service are the original user's authentication credentials including the second authentication factor. End-to-End Encryption in iCloud Elcomsoft Phone Breaker enables access to iCloud data with end-to-end encryption. Protected categories include iCloud Keychain, iCloud Messages, Health, Screen Time and Maps data. Accessing end-to-end encrypted data requires the user's full authentication credentials including second authentication factor, as well as a system password or screen lock password to one of the user's devices. iCloud Keychain Elcomsoft Phone Breaker is the only tool on the market to access, extract and decrypt iCloud Keychain, Apple's cloud-based system for storing and syncing passwords, credit card data and other highly sensitive information across devices. As opposed to authorizing a new Apple device, Elcomsoft Phone Breaker does not become part of the circle of trust and does not require a middleware device, thus offering truly forensic extraction of protected records. Screen Time Passcode The Screen Time passcode is an optional feature in iOS 12 and newer versions that can be used to secure the Content & Privacy Restrictions. Once the password is set, iOS will prompt for the Screen Time passcode if an expert attempts to reset the device backup password (iTunes backup password) in addition to the screen lock passcode. As a result, experts will require two passcodes in order to reset the backup password: the device screen lock passcode and the Screen Time passcode. Since the 4-digit Screen Time passcode is separate to the device lock passcode (the one that is used when locking and unlocking the device), it becomes an extra security layer effectively blocking logical acquisition attempts. By extracting and analyzing Screen Time information, experts can extract Screen Time passwords, thus gaining the ability to remove Screen Time protection and/or to reset the password protecting local (iTunes) backups. This in turn makes logical acquisition easily possible. iCloud Messages and Health Data Apple supports Health and Messages sync through iCloud. Elcomsoft Phone Breaker is the first tool on the market to extract and decrypt messages from iCloud complete with attachments, extract and decrypt Health data. To access Health and Messages, the login and password to the user's Apple Account, one-time code to pass Two-Factor Authentication and a screen lock password or system password for one of the already enrolled devices are required. Access iCloud without Login and Password If the user's Apple ID and password are not available, Elcomsoft Phone Breaker may be able to use a binary authentication token to access limited sets of synchronized data. The use of authentication tokens allows bypassing two-factor authentication even if no access to the second authentication factor is available. New features: Extract Skype Conversations, Messages, Files and Metadata The latest update enables the downloading of Skype conversation histories, files, contact lists and metadata directly from the user's Microsoft account. Individual and group chats, text messages and attachments are extracted. The downloading of the entire conversation of an average Skype history only takes minutes! For deleted chats and messages as well as for files purged from Skype servers after the 30-day retention period, Elcomsoft Phone Breaker can obtain metadata such as the date and time the file was deleted, the file's name and size, sender's Skype ID and the name of the chat. New iCloud Engine, Low-Level Access to iCloud Drive The new and improved iCloud download engine is faster and significantly more robust than ever. Thanks to the new iCloud engine, Elcomsoft Phone Breaker becomes the first and only tool on the market that can download iCloud backups produced by Apple devices running all versions of iOS up to the latest versions. Advanced iCloud Drive structure analysis is an optional feature allowing users to enable deep, low-level analysis of iCloud Drive secure containers. While high-level file and folder access is all you need in most circumstances, the more comprehensive low-level extraction will return the missing bits and pieces scattered around in legacy containers. Whats New: fixed some issues with iCloud access through proxy fixed Microsoft account data (web & search history, locations) downloading HOMEPAGE
  2. Windows x64 | Languages: English | File Size: 123.29 MB Perform physical and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image. - Physical acquisition for 32-bit and 64-bit iOS devices via jailbreak - Logical acquisition with iTunes-style backup includes decrypted keychain - Unlocks iOS devices with pairing records (lockdown files) - Decrypts keychain items and extracts device keys - Real-time file system acquisition for jailbroken devices - Quickly extracts media and shared files, even if backup password is set Enhanced Forensic Access to iPhone/iPad/iPod Devices running Apple iOS Perform the complete forensic acquisition of user data stored in iPhone/iPad/iPod devices. Elcomsoft iOS Forensic Toolkit allows imaging devices' file systems, extracting device secrets (passcodes, passwords, and encryption keys) and decrypting the file system image. Access to most information is provided instantly. Please note that some models require jailbreaking. See Compatible Devices and Platforms for details. Physical Acquisition for Legacy, 32-bit and 64-bit Apple Devices Physical acquisition is the only acquisition method to extract full application data, downloaded messages and location history. Physical acquisition operates on fixed-timeframe basis, which guarantees the delivery of the entire content of a 32-GB device in 40 minutes or less (depending on the amount of information stored in the device). In many cases, physical acquisition returns more data than logical acquisition, as many files are locked by the operating system and not accessible during the process of logical acquisition. Elcomsoft iOS Forensic Toolkit supports both legacy hardware (iPhone 4 and older), jailbroken 32-bit devices (iPhone 4S through 5C) and jailbroken 64-bit devices (iPhone 5s through iPhone X). A proprietary acquisition technique is exclusively available in Elcomsoft iOS Forensic Toolkit for 64-bit devices. Physical acquisition for 64-bit devices is fully compatible with jailbroken iPhones and iPads equipped with 64-bit SoC, returning the complete file system of the device (as opposed to bit-precise image extracted with the 32-bit process). Only devices with known or empty passcode are supported; passcode protection must be removed in iOS settings prior to acquisition. Logical Acquisition with Keychain Extraction iOS Forensic Toolkit supports logical acquisition, a simpler and safer acquisition method compared to physical. Logical acquisition produces a standard iTunes-style backup of information stored in the device. While logical acquisition returns less information than physical, experts are recommended to create a logical backup of the device before attempting more invasive acquisition techniques. Logical acquisition with iOS Forensic Toolkit is the only acquisition methods allowing access to encrypted keychain items. Logical acquisition should be used in combination with physical for extracting all possible types of evidence. Media and Shared Files Extraction iOS Forensic Toolkit offers the ability to quickly extract media files such as Camera Roll, books, voice recordings, and iTunes media library. As opposed to creating a local backup, which could be a potentially lengthy operation, media extraction works quickly and easily on all supported devices. Extraction from locked devices is possible by using a pairing record (lockdown file). In addition to media files, iOS Forensic Toolkit can extract stored files of multiple apps, extracting crucial evidence from 32-bit and 64-bit devices without a jailbreak. While access to app data without a jailbreak is limited, this new technique allows extracting Adobe Reader and Microsoft Office locally stored documents, MiniKeePass password database, and a lot more. The extraction requires an unlocked device or a non-expired lockdown record. If a lockdown record is used, some files may not be accessible unless the lock screen passcode is removed. Perform physical and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image. All Features and Benefits - Physical Acquisition for 32-bit and 64-bit iOS Devices - Logical Acquisition with Lockdown Support and Keychain Extraction - Access More Information than Available in iPhone Backups - Keychain Recovery - Passcode Recovery RELEASE NOTES: - Improved connection protocol between the iOS device and the host: faster and more reliable; W-Fi connections no longer affect the acquisition process - Improved support for iOS 13.4.x - Added support for iOS 13.5 (beta) - Added support for some Windows 10 configurations (iTunes & driver issues) - Fixed the problem when acquiring crash & diagnostic logs - Fixed the problem when creating the application list - Added acquisition time reporting for time-consuming operations Compatible Devices and Platforms: - 64-bit iOS devices with jailbreak: physical acquisition (file system extraction, keychain decryption) - Apple TV 4 (cable connection) and Apple TV 4K (wireless connection through Xcode, Mac only) - Apple Watch (all generations); requires a third-party IBUS adapter - No jailbreak: advanced logical acquisition only [1] Logical acquisition includes: - Extended information about the device - iTunes-format backup (includes many keychain items) - List of installed apps - Media files (even if the backup is password-protected) - Shared files (even if the backup is password-protected) System Requirements: - Windows Server 2016 - Windows Server 2012 - Windows 7 (32 bit) - Windows 7 (64 bit) - Windows 8 - Windows 8.1 - Windows 10 HOMEPAGE
  3. Elcomsoft Advanced Office Password Recovery Pro 6.64.2539 Multilingual | File size: 57.8 MB Advanced Office Password Recovery unlocks documents created with all versions of Microsoft Office from the ancient 2.0 to the modern 2019, and supports documents in OpenDocument and Hangul Office formats. The tool can recover passwords for Microsoft Word, Excel, Access, Outlook, Project, Money, PowerPoint, Visio, Publisher and OneNote, all OpenOffice applications, and all applications comprising the Hangul Office suite. Baster Attacks with GPU Acceleration Microsoft has strengthened password protection in Office 2007, further improving its strength in Office 2013. OpenDocument and Hangul Office formats are equally strong. With computation-intensive encryption used in latest versions of Microsoft Office, password recovery tools relying solely on computer's CPU are no longer able to provide reasonable recovery times. To further boost the recovery speed, Elcomsoft enables support for multiple video cards and simultaneous operation of all CPU and GPU cores. All or some CPU/GPU cores can be designated to the password recovery task, enabling maximum performance or allowing for nonintrusive background processing. The latest generation of [ElcomSoft GPU acceleration technology][gpu] supports unlimited numbers of AMD or NVIDIA boards including the latest generation of high-performance accelerators. Instant Access to Password-Protected Documents Not all passwords are equally strong. Advanced Office Password Recovery provides instant access to many types of password-protected documents, including those created in Microsoft Word and Excel versions 97 and 2000. Later versions of Microsoft Word and Excel save documents and spreadsheets in compatibility mode by default making them available for instant password recovery. By carefully analyzing the algorithms and implementations of password protection in different versions of Microsoft Office applications, ElcomSoft developed work-around solutions that allow recovering certain kinds of passwords instantly instead of performing lengthy attacks. Advanced Office Password Recovery is well aware of the various methods of password protection, and implements all the tricks that allow you to recover protected documents in a matter of seconds. Features and Benefits: Automatic Password Removal Even if your documents don't fall into the instant recovery category, their protection may be removed automatically in less than 10 minutes. Just click 'Open', and Advanced Office Password will quickly perform all the steps to speed up the recovery, and to unlock your documents completely automatically. Advanced Office Password Recovery performs a preliminary attack on the password, attempting to unlock the document with commonly used passwords and passwords based on dictionary words. Your document may be recovered without any extra effort in just a few minutes! Targeting Human Psychology With latest versions of popular office suites such as Microsoft Office 2019 implementing the strongest security, brute force attacks become painfully slow and ineffective even in GPU-accelerated environments. The limited recovery speed of Microsoft Office 2019 passwords required the use of a smarter approach than brute force or simple dictionary attacks. With truly random passwords now taking near infinite time to recover, Advanced Office Password Recovery employs a social engineering approach and implements smart attacks targeting human psychology. Elcomsoft Advanced Office Password Recovery makes use of every bit of information you know about a password. Just specifying your company security policy can increase the speed of the attack tenfold. Remember how many characters your password had, or that it was certainly longer than a certain length? Sure your password had numbers or letters, or both? Maybe you can recollect the first or the last character, or remember whether it was a letter or a number? Every little bit of extra information helps to speed up the recovery. Dictionary Attacks Most passwords used by human beings are based on a single word or a combination of words from a certain language. Before reverting to the brute force attack, Advanced Office Password Recovery performs a full-scaled comprehensive attack based on a dictionary. Use a small built-in dictionary or specify your own dictionaries no matter the language, and Advanced Office Password Recovery will attempt single words and word combinations in different cases and variations. Advanced Attacks Elcomsoft Advanced Office Password Recovery is the industry leader implementing highly sophisticated types of attacks. Dictionary attacks are accompanied with mutations that substitute, duplicate or modify password characters in a way used by typical computer users to increase their password strength. Mask attacks allow putting any knowledge about the password to work. However little is known about the password, every little bit of information helps reduce the number of passwords to try. By specifying the approximate length or structure of the password and entering characters that were used or not used, an expert can reduce the number of passwords to try by a great deal. Combination attacks allow combining dictionary words from two different dictionaries, automatically adding separators as needed. Finally, the Hybrid attack enables experts to create extremely flexible rules describing passwords that were likely to be chosen by a particular user. The rules are described in a file in a format compatible with industry-standard password recovery tools. Accelerated Brute Force Attack If you're blank about the password, Advanced Office Password Recovery will revert to the last resort: the brute force attack. Thanks to the highly optimized low-level code Advanced Office Password Recovery provides the best-in-class performance for the brute-force password recovery. Guaranteed Recovery of Word/Excel Documents If your documents have been saved in Microsoft Word or Excel 97/2000, or if one used Office XP/2013 in default compatibility mode, guaranteed password removal is possible with Advanced Office Password Breaker. The majority of documents are still saved in this format, protected with weak 40-bit encryption Attacking the 40-bit encryption keys is not just significantly faster than trying all possible combinations of letters and numbers, but guarantees the recovery of your documents within a limited period of time What's new: official site does not provide any info about changes in this version. HOMEPAGE
  4. File Size: 29.6 MB Elcomsoft Wireless Security Auditor is an all-in-one tool to help administrators verify how secure and how busy a company's wireless network is. The tool will attempt to break into a secured Wi-Fi network by analyzing the wireless environment, sniffing Wi-Fi traffic and running an attack on the network's WPA/WPA2-PSK password. Featuring patented cost-efficient GPU acceleration technologies and employing a range of smart attacks targeting the human factor, Elcomsoft Wireless Security Auditor runs a highly efficient accelerated attack on the network for a pre-defined amount of time in order to test how secure your wireless environment is. How Secure Is Your Wireless Network? A single weak link poses a valid security threat to the entire corporate network. Wi-Fi networks can provide sufficient security if configured properly and accompanied by an adequate password policy. Elcomsoft Wireless Security Auditor identifies and exposes security problems in your wireless network to allow network administrators taking appropriate measures and adopting a proper password policy. If one of your network workstations is compromised and a malicious person gets network access to at least one system, it may not even be necessary for an attacker to be physically close to the wireless network in order to obtain full access to data sent and received. A password hash is normally stored in the Windows Registry, and can be retrieved remotely for off-line analysis. Elcomsoft Wireless Security Auditor can simulate attacks from the inside by automatically importing saved password hashes as retrieved by Elcomsoft Proactive System Password Recovery. This kind of attacks allows determining how secure your wireless network is to insider attacks. Built-in Wi-Fi Sniffer Elcomsoft Wireless Security Auditor comes with a custom NDIS driver for 32-bit and 64-bit systems (Windows 7, 8, 8.1 and 10). The driver is digitally signed by Microsoft, and can be installed on all compatible versions of Windows including the latest builds of Windows 10. By automatically intercepting Wi-Fi traffic and performing an attack on selected Wi-Fi networks, Elcomsoft Wireless Security Auditor becomes a one-stop solution for auditing Wi-Fi networks. WinPCap drivers are required to enable Wi-Fi sniffing. The WinPCap driver is included with Wireless Security Auditor. In addition, Elcomsoft Wireless Security Auditor fully supports dedicated AirPCap adapters provided that the correct drivers are installed. Attack Wi-Fi Passwords Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor can work as a wireless sniffer or operate offline by analyzing a dump of network communications. The tool attempts to recover the original WPA/WPA2-PSK passwords in plain text. Elcomsoft Wireless Security Auditor allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in password recovery, Elcomsoft Wireless Security Auditor is one of the fastest, smartest and most advanced tools for recovering Wi-Fi passwords. If Elcomsoft Wireless Security Auditor fails to recover a Wi-Fi password within reasonable time, a real attack would similarly fail. Notes Elcomsoft Wireless Security Auditor integrates a custom NDIS driver for 32-bit and 64-bit Windows systems (Windows 7, 8, 8.1 and 10), and automatically installs the required WinPCap drivers. Most modern Wi-Fi adapters are supported. Drivers are digitally signed by Microsoft. Tcpdump support: the tool can use a standard tcpdump log produced by a third-party Wi-Fi sniffer. In order to audit your wireless network, at least one handshake packet must be intercepted or discovered in the tcpdump file. AirPCap support: Elcomsoft Wireless Security Auditor supports AirPCap adapters, and requires proper drivers installed. Whats New: added support for NVIDIA RTX 3XXX GPU mask attack: new mask "?W[dictionary name]" leading character of a dictionary word tried in both upper and lower cases mask attack: character ranges can now include zero or more characters (instead of one or more) updated database of device MAC addresses fixed bug with fast password search in network sniffer HOMEPAGE
  5. Elcomsoft Wireless Security Auditor Pro 7.40.821 Multilingual | 40.2 Mb Elcomsoft Wireless Security Auditor is an all-in-one tool to help administrators verify how secure and how busy a company's wireless network is. The tool will attempt to break into a secured Wi-Fi network by analyzing the wireless environment, sniffing Wi-Fi traffic and running an attack on the network's WPA/WPA2-PSK password. Featuring patented cost-efficient GPU acceleration technologies and employing a range of smart attacks targeting the human factor, Elcomsoft Wireless Security Auditor runs a highly efficient accelerated attack on the network for a pre-defined amount of time in order to test how secure your wireless environment is. How Secure Is Your Wireless Network? A single weak link poses a valid security threat to the entire corporate network. Wi-Fi networks can provide sufficient security if configured properly and accompanied by an adequate password policy. Elcomsoft Wireless Security Auditor identifies and exposes security problems in your wireless network to allow network administrators taking appropriate measures and adopting a proper password policy. If one of your network workstations is compromised and a malicious person gets network access to at least one system, it may not even be necessary for an attacker to be physically close to the wireless network in order to obtain full access to data sent and received. A password hash is normally stored in the Windows Registry, and can be retrieved remotely for off-line analysis. Elcomsoft Wireless Security Auditor can simulate attacks from the inside by automatically importing saved password hashes as retrieved by Elcomsoft Proactive System Password Recovery. This kind of attacks allows determining how secure your wireless network is to insider attacks. Built-in Wi-Fi Sniffer Elcomsoft Wireless Security Auditor comes with a custom NDIS driver for 32-bit and 64-bit systems (Windows 7, 8, 8.1 and 10). The driver is digitally signed by Microsoft, and can be installed on all compatible versions of Windows including the latest builds of Windows 10. By automatically intercepting Wi-Fi traffic and performing an attack on selected Wi-Fi networks, Elcomsoft Wireless Security Auditor becomes a one-stop solution for auditing Wi-Fi networks. WinPCap drivers are required to enable Wi-Fi sniffing. The WinPCap driver is included with Wireless Security Auditor. In addition, Elcomsoft Wireless Security Auditor fully supports dedicated AirPCap adapters provided that the correct drivers are installed. Attack Wi-Fi Passwords Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor can work as a wireless sniffer or operate offline by analyzing a dump of network communications. The tool attempts to recover the original WPA/WPA2-PSK passwords in plain text. Elcomsoft Wireless Security Auditor allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in password recovery, Elcomsoft Wireless Security Auditor is one of the fastest, smartest and most advanced tools for recovering Wi-Fi passwords. If Elcomsoft Wireless Security Auditor fails to recover a Wi-Fi password within reasonable time, a real attack would similarly fail. Additional Requirements WPA/WPA2 password hash(es) in any format supported by the program (e.g. tcpdump) At least one of supported NVIDIA or ATI cards is recommended AirPCap adapter (for sniffing; Pro version only) Operating System: Windows XP, Vista, 7, 8/8.1, 10 Home Page -https://www.elcomsoft.com/ Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live Uploadgig https://uploadgig.com/file/download/4d2e11d8489009f3/skj04.Elcomsoft.Wireless.Security.Auditor.Pro.7.40.821.Multilingual.rar Rapidgator https://rapidgator.net/file/92d49f374f83c1fc39784642c631acf2/skj04.Elcomsoft.Wireless.Security.Auditor.Pro.7.40.821.Multilingual.rar.html NitroFlare http://nitroflare.com/view/89693E8447C027E/skj04.Elcomsoft.Wireless.Security.Auditor.Pro.7.40.821.Multilingual.rar
  6. The complete collection of ElcomSoft products from March 2021 ! ElcomSoft software package for removing password protection with the maximum number of supported data formats, security systems and encryption algorithms. The set includes all the company's products for password recovery. Supports over 500 data formats. The applications have undergone rigorous internal testing, installed and tested by a large number of large customers. Highest performance in the industry. Hardware acceleration using consumer video cards. Distributed attacks supporting up to 10,000 workstations with linear scaling. ElcomSoft Password Recovery Bundle Forensic Edition 2021 includes: ElcomSoft Advanced Archive Password Recovery 4.54.110 ElcomSoft Advanced EFS Data Recovery Pro 4.50.51.1795 ElcomSoft Advanced IM Password Recovery 4.90.1805 ElcomSoft Advanced Intuit Password Recovery 3.12.502 ElcomSoft Advanced Lotus Password Recovery 2.12.1784 ElcomSoft Advanced Mailbox Password Recovery 1.11.702 ElcomSoft Advanced Office Password Breaker Enterprise 3.06.803 ElcomSoft Advanced Office Password Breaker Pro 6.50.2206 ElcomSoft Advanced Office Password Recovery Pro 6.34.1889 ElcomSoft Advanced PDF Password Recovery Enterprise 5.08.145 ElcomSoft Advanced Sage Password Recovery 2.72.2273 ElcomSoft Advanced SQL Password Recovery 1.15.2215 ElcomSoft Advanced BA Password Recovery 1.63 ElcomSoft Advanced WordPerfect Office Password Recovery 1.38.1792 ElcomSoft Cloud eXplorer 2.32.37098 ElcomSoft Dictionaries 1.0.1110 ElcomSoft Distribute Password Recovery 4.20.1393 ElcomSoft eXplorer for WhatsApp 2.78.37223 ElcomSoft Forensic Disk Decryptor 2.17.916 ElcomSoft Internet Password Breaker 3.30.5802 ElcomSoft iOS Forensic Toolkit 7.0.313.x64 ElcomSoft Lightning Hash Cracker 0.60 ElcomSoft Password Digger 1.05.217 ElcomSoft Phone Breaker Forensic Edition 9.64.37795 ElcomSoft Phone Breaker 9.64.37795 ElcomSoft Phone Password Breaker Professional 3.00.106 ElcomSoft Phone iewer 5.20.37270 ElcomSoft Proactive Password Auditor 2.08.64 ElcomSoft Proactive System Password Recovery 6.60.568 ElcomSoft System Recovery Professional Edition 7.2.628 BootCD ElcomSoft Wireless Security Auditor Professional 7.30.593 Description of package applications: ElcomSoft Advanced Archive Password Recovery - decryption of protected ZIP and RAR archives and recovery of original passwords. Maximum performance in recovering complex passwords. Some types of archives are guaranteed to be decrypted within an hour. ElcomSoft Advanced EFS Data Recovery Pro - decrypts NTFS-encrypted files using Encrypting File System (EFS). ElcomSoft Advanced IM Password Recovery - Instantly extract passwords from dozens of instant messaging programs. Support for ICQ, AOL, MSN, Yahoo !, clients of Mail.ru, Jabber, Picasa, QIP and many others. The extracted passwords can be used to compile a dictionary, with the help of which it is possible to significantly speed up the search for passwords for encrypted files. ElcomSoft Advanced Intuit Password Recovery - restoring access to password-protected Intuit Quicken and QuickBooks documents. ElcomSoft Advanced Lotus Password Recovery - instant recovery of passwords of any complexity for Lotus SmartSuite documents. ElcomSoft Advanced Mailbox Password Recovery - guaranteed recovery of passwords for email clients and POP3 and IMAP email accounts. Retrieving username and password stored on the user's computer. Built-in POP3 / IMAP server emulator for intercepting POP3 and IMAP passwords from any mail clients, including mobile applications. ElcomSoft Advanced Office Password Breaker Enterprise Edition - guaranteed recovery of access to encrypted documents in the format of Microsoft Office 97/2000 applications in minutes. ElcomSoft Advanced Office Password Recovery Pro - guaranteed recovery of access to encrypted documents in the format of Microsoft Office 97/2000 applications in minutes. ElcomSoft Advanced PDF Password Recovery Enterprise - guaranteed removal of restrictions on editing, printing and copying PDF files. Password recovery for opening a document with support for hardware acceleration. The patented Thunder Tables technology guarantees 40-bit key recovery within a minute. ElcomSoft Advanced Sage Password Recovery - guaranteed access to protected ACT documents! Change and recover passwords for BLB, MUD and ADF / PAD documents created with ACT! Remote operation does not require ACT! on the computer. ElcomSoft Advanced SQL Password Recovery - guaranteed recovery of access to password-protected Microsoft SQL Server databases. Instantly reset or change any user or database administrator password in Microsoft SQL Server format. ElcomSoft Advanced VBA Password Recovery is a tool for recovering, removing and replacing passwords for Microsoft Office, OpenOffice, Apple iWork and Hangul Office documents with support for hardware acceleration using video cards. ElcomSoft Advanced WordPerfect Office Password Recovery - instant password recovery for Corel WordPerfect Office documents. Extract passwords from WordPerfect, Quattro Pro and Paradox within seconds. ElcomSoft Cloud eXplorer ECX Forensic - Extract and view data from Google accounts. It retrieves passwords and browser history, user location data for the entire period of the account existence, mail messages and contacts, Google Keep notes, bookmarks, search history, calendars and much more. Password authentication and no password authentication are supported. ElcomSoft Distributed Password Recovery is a productive solution for corporate clients of government organizations. Recover passwords for dozens of file, document, key and certificate formats on clusters of computers united into a single distributed computer network. ElcomSoft Explorer for WhatsApp Standard is a tool for retrieving, viewing and analyzing the communication of WhatsApp users with iOS and Android support. ElcomSoft Forensic Disk Decryptor Common - Instantly decrypt or mount BitLocker, FileVault 2, PGP, TrueCrypt and VeraCrypt encrypted containers using passwords, escrow keys and encryption keys extracted from a RAM image, paging file, or hibernation. ElcomSoft Internet Password Breaker - Instantly extract available passwords for websites, accounts and mailboxes from a variety of applications. Supports saved fields and passwords in Internet Explorer, Edge, Chrome, Firefox, Opera, Outlook and Outlook Express, Windows Mail and Windows Live Mail. ElcomSoft iOS Forensic Toolkit is a specialized tool for extracting data from devices running Apple iOS using physical and logical analysis methods. ElcomSoft Password Digger Standard - decryption of the contents of system and user protected keychain vaults of macOS (OS X) Saving a list of passwords to a text file that can be used as a dictionary to speed up the search for passwords with appropriate tools. ElcomSoft Phone Breaker - Extract information from devices running iOS, Windows Phone, Windows 10 Mobile and BlackBerry 10, decrypt backups and brute force unknown passwords using hardware acceleration. ElcomSoft Phone Password Breaker - Extract information from devices running iOS, Windows Phone, Windows 10 Mobile and BlackBerry 10, decrypt backups and brute force unknown passwords using hardware acceleration. ElcomSoft Phone Viewer Forensic is a simple, convenient and compact tool for viewing information extracted from devices running iOS, BlackBerry and mobile Windows. The product supports Elcomsoft Phone Breaker output formats and standard iTunes and BlackBerry Link backup formats. ElcomSoft Proactive Password Auditor - audit of corporate security policy. The product will allow you to find out the degree of security of the local network by launching full-scale attacks on account passwords. By identifying weak and insecure passwords, the product identifies weaknesses in the protection of the local network. ElcomSoft Proactive System Password Recovery - recover many types of passwords and view hidden Windows information. Extract Wi-Fi keys (WEP and WPA-PSK), VPN, RAS, dial-up passwords, passwords for network resources, connections and RDP. ElcomSoft System Recovery BootISO will help restore access to Windows accounts, including local, network and Microsoft Accounts. Supports reset and recovery of original passwords. ElcomSoft Wireless Security Auditor - audit of the security of wireless Wi-Fi networks, checking the congestion of wireless networks and channels. Capture packets with a dedicated or consumer wireless Wi-Fi adapter and full blown WPA / WPA2 password attack. Changes in version 2021.03: Elcomsoft Advanced Intuit Password Recovery 3.12.502 Elcomsoft Advanced Mailbox Password Recovery 1.11.702 Elcomsoft Cloud eXplorer 2.32.37098 Elcomsoft eXplorer for WhatsApp 2.78.37223 Elcomsoft Forensic Disk Decryptor 2.17.916 Elcomsoft Internet Password Breaker 3.30.5802 ElcomSoft iOS Forensic Toolkit 7.0.313 Elcomsoft Phone Breaker Forensic Edition 9.64.37795 Elcomsoft Phone Breaker 9.64.37795 Elcomsoft Phone Viewer 5.20.37270 OS: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2012, Windows Server 2016, Windows Server 2019
  7. File Size: 119.4 MB Extract everything from your Google Account. Download users' location history, files and documents, Contacts, Hangouts Messages, Google Keep, Chrome browsing history, search history and page transitions, Calendars, images, and a lot more. New features: Passwordless Authentication Several years back, we developed a workaround, allowing experts to use binary authentication token to access Apple iCloud backups and synced data without the password. Today, we are introducing the same thing for Google accounts. Google Drive Support Elcomsoft Cloud eXplorer introduces support for Google Drive, offering a truly integrated, forensically sound solution to extract the most data from Google accounts. Forensic Acquisition of Google Accounts Acquire information from users' Google Account with a simple all-in-one tool! Elcomsoft Cloud Explorer makes it easier to download, view and analyze information collected by the search giant, providing convenient access to users' search and browsing history, page transitions, contacts, Google Keep notes, Hangouts messages, as well as images stored in the user's Google Photos account. Google collects massive amounts of information from registered customers. Elcomsoft Cloud Explorer extracts information from the many available sources, parses and assembles the data, presenting information in human-readable form. Google Data in Digital Forensics Cloud forensics is an emerging area to forensic experts and IT security officers. The amount of data generated by consumers using the many online services is hard to underestimate. This data can become extremely valuable for an investigation of criminal cases and security breaches of IT infrastructure. Online services are increasingly used by consumers, including those of a criminal kind. Cloud service providers such as Google retain astonishing amounts of data that literally follow their users' every step. Acquiring this evidence from cloud storage services can be a challenge. Viewing, discovering and analyzing the data may present yet another challenge if the investigator lacks tools and knowledge. Elcomsoft Cloud Explorer was designed specifically to address those limitations. Requiring no special expertise and no prior training, Elcomsoft Cloud Explorer falls into the category of all-in-one tools offering one-click downloading and easy viewing of information. The tool comes with everything you need to investigate information that Google has about a suspect. What Is Extracted Elcomsoft Cloud Explorer offers over-the-air acquisition for a wide range of Google services including all of the following: User Profile and other info Messages (Google Hangouts) Text messages (SMS) (Android 8.0 Oreo and newer for all smartphones; Android 7 or newer for Google Pixel and Pixel XL) Call logs Saved Wi-Fi credentials (SSID and passwords) Email messages (Gmail) via Gmail API Contacts (including synced contacts from mobile devices) Notes (Google Keep) Search History (including Web sites visited after firing up the search) Google Chrome data[1] (synced bookmarks, Web forms, logins and passwords, page transitions) Media (images and videos from Google Photos including EXIF data) Calendars Dashboard Location history including enhanced mapping data (Routes and Places) Files and documents from Google Account Whats New: HOMEPAGE
  8. File Size: 74 MB Elcomsoft Phone Breaker enables forensic access to information stored in a wide range of mobile devices. The tool delivers logical acquisition for Apple iOS devices, BlackBerry OS and BlackBerry 10 smartphones, as well as devices powered by Windows 10, Windows Phone and Windows 10 Mobile operating systems. Acquisition of local and cloud backups as well as cloud extraction of synchronized data are available. Break passwords and decrypt iOS backups with GPU acceleration Decrypt iCloud Keychain and Messages with media files and documents from iCloud Obtain synchronized data from Apple and Microsoft accounts Download iCloud backups and synced data with or without Apple ID password Logical Acquisition of Mobile Devices Elcomsoft Phone Breaker enables forensic access to information stored in a wide range of mobile devices. The tool delivers logical acquisition for Apple iOS devices, BlackBerry OS and BlackBerry 10 smartphones, as well as devices powered by Windows 10, Windows Phone and Windows 10 Mobile operating systems. Acquisition of local and cloud backups as well as cloud extraction of synchronized data are available. Decrypt iOS Backups Decrypt password-protected local backups produced by Apple iPhone, iPad and iPod Touch devices. Hardware-accelerated attacks make use of existing AMD and NVIDIA video cards to speed up the recovery. Cloud Acquisition via Apple iCloud and Microsoft Account Cloud acquisition is a highly effective way of retrieving up-to-date information backed up or synced by modern smartphones with their respective cloud services. Elcomsoft Phone Breaker supports the extraction of cloud backups and synced data from Apple iCloud and Microsoft Account, enabling remote acquisition of iPhone and iPad devices as well as smartphones running Windows Phone and Windows 10 Mobile. Online backups can be acquired by forensic specialists without having the original iOS or Windows Phone device in hands. All that's needed to access online backups stored in the cloud service are the original user's credentials including Apple ID or Live ID accompanied with the corresponding password. Access iCloud without Login and Password [1] If the user's Apple ID and password are not available, Elcomsoft Phone Breaker can use a binary authentication token created by Apple iCloud Control Panel in order to login to iCloud and retrieve information. The use of authentication tokens allows bypassing two-factor authentication even if no access to the secondary authentication factor is available. Acquire iCloud Keychain Elcomsoft Phone Breaker is the only tool on the market to access, extract and decrypt iCloud Keychain, Apple's cloud-based system for storing and syncing passwords, credit card data and other highly sensitive information across devices. As opposed to authorizing a new Apple device, Elcomsoft Phone Breaker does not become part of the circle of trust and does not require a middleware device, thus offering truly forensic extraction of protected records. Download Health and Messages from iCloud Apple supports Health and Messages sync through iCloud. Elcomsoft Phone Breaker is the first tool on the market to extract and decrypt messages from iCloud complete with attachments, extract and decrypt Health data. To access Health and Messages, the login and password to the user's Apple Account, one-time code to pass Two-Factor Authentication and a screen lock password or system password for one of the already enrolled devices are required. Decrypt FileVault 2 Elcomsoft Phone Breaker can extract escrow decryption keys from the user's Apple account, and make use of those keys to decrypt macOS FileVault 2 volumes even if user account password is not known. Note: At this time, Elcomsoft Phone Breaker can only decrypt HFS+ volumes. NEW FEATURES iCloud Messages and Attachments Since iOS 11.4, messages can sync through iCloud. Elcomsoft Phone Breaker is the first tool on the market to extract and decrypt messages from iCloud complete with additional content: pictures, videos, documents and other attachments. To access iCloud Messages, the login and password to the user's Apple Account, one-time code to pass Two-Factor Authentication and a screen lock password or system password for one of the already enrolled devices are required. Extract Apple Health Data from iCloud Health data can become an essential piece of evidence. Heartrate, sleeping habits, workouts, steps and walking routines are just a few things that come to mind speaking of Apple Health. Elcomsoft Phone Breaker can remotely extract synced Health data from iOS devices from the user's iCloud account. Supports: local iOS backups (iTunes); iCloud and iCloud Drive backups; iCloud synced data (call logs, photos, browsing history etc.); BlackBerry 10 backups; Microsoft Account (with valid authentication credentials); Windows Phone 8, 8.1, Windows 10 Mobile backups; iCloud authentication tokens. Whats New: improved iCloud authentication (now faster and more reliable) improved iCloud download performance improved handling of iCloud-related errors HOMEPAGE
  9. File Size: 73.7 MB Acquire and analyze WhatsApp communication histories from multiple sources. Extract WhatsApp databases from Android phones with and without root access, download WhatsApp backups from Google Drive and iCloud Drive or extract from local and cloud iOS system backups. Features: WhatsApp Acquisition from Android Elcomsoft Explorer for WhatsApp can extract WhatsApp conversations directly from a wide range of Android smartphones. As WhatsApp securely encrypts its databases, root access is recommended (but not required) for acquisition. If no root access is available, Elcomsoft Explorer for WhatsApp will employ a workaround by pushing an acquisition tool into the phone temporarily for extracting the decryption key. If root access is available, Elcomsoft Explorer for WhatsApp can extract WhatsApp conversations from Android handsets running Android 4.0 through 7.1.1. Without root access, compatibility is limited to Android versions 4.0 through 6.0.1. WhatsApp Business for Android WhatsApp Business extraction is supported for Android devices. Since WhatsApp Business is a separate app with a different security profile, Elcomsoft Explorer for WhatsApp requires root access to extract information directly from a physical Android handset. Logical acquisition (backup files) as well as cloud extraction from Google Drive are available without root access. Downloading Proprietary WhatsApp Backups WhatsApp has the ability to create cloud backups of its database, saving them in Apple iCloud Drive (iPhone) or Google Drive (Android phones). WhatsApp backups are unique per phone number. This means that the number of available WhatsApp backups in the user's cloud account will depend on how many different phone numbers are used. Information Available in WhatsApp Databases WhatsApp is an instant messaging application. Its databases contain information about peer-to-peer communications between users, including the following records: WhatsApp Database Content Sent and received text messages complete with contact ID's and timestamps User's contact database complete with phone numbers Call logs Pictures and videos sent and received, complete with timestamps and contact ID's Viewing and Exporting Elcomsoft Explorer for WhatsApp is equipped with a built-in viewer supporting multiple WhatsApp databases extracted from various sources. The viewer includes instant filtering and quick search functionality. Finding a certain contact, message or conversation is easy by specifying a date range or typing a partial key word into the search box. Whats New: fixed problem with WhatsApp database decryption HOMEPAGE
  10. File Size: 41.9 MB Elcomsoft Forensic Disk Decryptor offers all available methods for gaining access to information stored in encrypted BitLocker, FileVault 2, PGP, TrueCrypt and VeraCrypt disks and volumes. The toolkit allows using the volume's plain-text password, escrow or recovery keys, as well as the binary keys extracted from the computer's memory image or hibernation file. FileVault 2 recovery keys can be extracted from iCloud with Elcomsoft Phone Breaker, while BitLocker recovery keys are available in Active Directory or in the user's Microsoft Account. New features: Built-In Memory Imaging Tool A forensic-grade memory imaging tool is included with Elcomsoft Forensic Disk Decryptor. The tool uses zero-level access to computer's volatile memory in order to create the most complete memory image. The supplied RAM imaging tool operates through a custom kernel-level driver. The driver is digitally signed with a Microsoft signature, making it fully compatible with all 32-bit and 64-bit versions of Windows from Windows 7 and up to the latest Windows 10 update. EnCase .E01 Support and Portable Version Elcomsoft Forensic Disk Decryptor 2.0 now fully supports EnCase images in the industry-standard .EO1 format, as well as encrypted DMG images. In addition, Elcomsoft Forensic Disk Decryptor can be used to create a portable installation on a user-provided USB flash drive. The portable installation can be used to image computer's volatile memory and/or decrypt encrypted volumes. A Fully Integrated Solution for Accessing Encrypted Volumes Elcomsoft Forensic Disk Decryptor offers all available methods for gaining access to information stored in encrypted BitLocker, FileVault 2, PGP, TrueCrypt and VeraCrypt disks and volumes. The toolkit allows using the volume's plain-text password, escrow or recovery keys, as well as the binary keys extracted from the computer's memory image or hibernation file. FileVault 2 recovery keys can be extracted from iCloud with Elcomsoft Phone Breaker, while BitLocker recovery keys are available in Active Directory or in the user's Microsoft Account. If neither the encryption key nor the recovery key can be extracted, EFDD can extract meta data from the encrypted container to let Elcomsoft Distributed Password Recovery do its job. Full Decryption, Instant Mount or Attack With fully automatic detection of encrypted volumes and encryption settings, experts will only need to provide path to the encrypted container or disk image. Elcomsoft Forensic Disk Decryptor will automatically search for, identify and display encrypted volumes and details of their corresponding encryption settings. Access is provided by either decrypting the entire content of an encrypted volume or by mounting the volume as a drive letter in unlocked, unencrypted mode. Both operations can be done with volumes as attached disks (physical or logical) or raw images; for FileVault 2, PGP and BitLocker, decryption and mounting can be performed using recovery key (if available). Full Decryption Elcomsoft Forensic Disk Decryptor can automatically decrypt the entire content of the encrypted container, providing investigators with full, unrestricted access to all information stored on encrypted volumes Real-Time Access to Encrypted Information In the real-time mode, Elcomsoft Forensic Disk Decryptor mounts the encrypted volume as a new drive letter on the investigator's PC. In this mode, forensic specialists enjoy fast, real-time access to protected information. Information read from mounted disks and volumes is decrypted on-the-fly in real time. No Decryption Key and No Recovery Key? If neither the decryption key nor the recovery key is available, Elcomsoft Forensic Disk Decryptor will extract metadata necessary to brute-force the password with Elcomsoft Distributed Password Recovery. Elcomsoft Distributed Password Recovery can attack plain-text passwords protecting the encrypted containers with a range of advanced attacks including dictionary, mask and permutation attacks in addition to brute-force. (Note: VeraCrypt is currently not supported.) New features: VeraCrypt Encryption VeraCrypt is the most popular successor to open-source disk encryption tool TrueCrypt. Compared to the original, VeraCrypt supposes a wider range of encryption methods and hash algorithms. In this update, Elcomsoft Forensic Disk Decryptor receives full support for VeraCrypt volumes, enabling experts extracting hash data from VeraCrypt containers to launch brute-force or smart dictionary attacks with Distributed Password Recovery. Whats New: added memory imaging support for Windows 10 (20H2) with a driver update minor bug fixes and performance improvements HOMEPAGE
  11. File Size: 21.4 MB Elcomsoft Internet Password Breaker instantly reveals Internet passwords, retrieves login and password information protecting a variety of Web resources and mailboxes in various email clients. The tool instantly extracts passwords, stored forms and AutoComplete information in popular Web browsers, and captures mailbox and identity passwords from popular email clients. According to various researches, 60 per cent of consumers reuse their passwords. In as many as 70 per cent of cases, a password protecting a hard-to-crack Office 2013 document, BitLocker volume or RAR5 archive would be a simple variation of one of the user's other passwords. Using the filtered wordlist produced by Elcomsoft Internet Password Breaker in Elcomsoft Distributed Password Recovery with simple mutations (such as appending up to 4 digits to the end of each password) can solve up to 70 per cent of cases in a matter of minutes. Adding a more complex mutation will increase the time spent on attacks, but may deliver even better results. Features: Instantly Dump Passwords into a Wordlist Instant Password Extraction Built-in Password Explorer Internet Explorer 7+ Support Reveal Email Passwords Whats New: extracting saved passwords from Quihoo 360 Safe Browser extracting saved passwords from Tor Browser HOMEPAGE
  12. File Size: 140.3 MB Analyze information extracted with ElcomSoft and third-party acquisition tools with a fast, lightweight viewer. Decrypt and view iOS backups and synced data, analyze iCloud Photo Library, BlackBerry 10 backups and Windows Phone/Windows 10 Mobile data and access synchronized data with ease. New features: Health Data Health data can become an essential piece of evidence. Heartrate, sleeping habits, workouts, steps and walking routines are just a few things that come to mind speaking of Apple Health. Elcomsoft Phone Breaker can remotely extract synced Health data from iOS devices from the user's iCloud account, while Elcomsoft Phone Viewer can help viewing and analyzing Health data. TAR Analysis Since the introduction of the iPhone 5s, Apple's first 64-bit iPhone, physical acquisition is exclusively available via file system imaging. Regardless of the tool performing physical acquisition (Elcomsoft iOS Forensic or third-party tools), the result of these efforts is always a TAR archive containing an image of the device's file system. Elcomsoft Phone Viewer is a lightweight and convenient tool to quickly analyze evidence found in the results of physical acquisition. Message Attachments in iCloud: Media Files and Documents The last version of Elcomsoft Phone Breaker adds support for message attachments such as media files, documents and other files, while Elcomsoft Phone Viewer allows analyzing messages and attachments obtained from iCloud. Analyzing media files and EXIF tags can help obtain massive amounts of location data as well as other essential evidence. Explore the content of local and cloud backups produced by iOS, BlackBerry 10, Windows Phone 8 and Windows 10 Mobile devices! Elcomsoft Phone Viewer is a small, lightweight tool enabling read-only access to contacts, messages, call logs, notes and calendar data located in mobile backups. In addition, the tool displays essential information about the device such as model name, serial number, date of last backup etc. Finally, the tool implements access to deleted SMS and iMessages stored in iOS backups. A Perfect Viewing Companion Yet another "me too" forensic viewer? We looked hard for a tool we could recommend to our customers for viewing data decrypted or downloaded with Elcomsoft Phone Breaker. No single tool on the market meets our stringent requirements on speed, compatibility and ease of use. That's why we introduced a viewing tool of our own. Elcomsoft Phone Viewer is the ideal viewing companion for Elcomsoft Phone Breaker, enabling full support for all data formats produced by this tool. Regularly maintained and timely updated, Elcomsoft Phone Viewer is the first to receive support for the latest mobile backup formats extracted, downloaded or decrypted with other ElcomSoft tools. Using our mobile acquisition tools? Elcomsoft Phone Viewer is a perfect companion! Note that Elcomsoft Phone Viewer can only open unencrypted backups as well as iTunes backups with a known password. Should you have a backup file encrypted with an unknown password, use Elcomsoft Phone Breaker to recover the password. Analyzes Online Activities Elcomsoft Phone Viewer displays the user's online activities including Web browsing history and search queries, browser bookmarks and opened tabs including page snapshots. Information about recent search queries and last visited Web sites already helped solve multiple cases, and will undoubtedly help investigating crime. Access to Synced Data, Passwords and Messages Information such as call logs, contacts, notes, calendars as well as Web browsing activities including Safari history (including deleted items), bookmarks and open tabs can be synced with Apple servers. Unlike iCloud backups that may or may not be created on daily basis, synced information is pushed to Apple servers just minutes after the corresponding activity has taken place. Once uploaded, synced data can be retained for months with is no option for the end user to clear the data or disable the syncing. Synchronized records can be obtained for extended periods of time; much longer than available in iOS devices and device backups. Existing and deleted records are obtained, and filter can be applied to only display deleted records. Elcomsoft Phone Viewer is ElcomSoft's stock tool for viewing synced data extracted from Apple iCloud with Elcomsoft Phone Breaker. ?he following types of synced data can be viewed: Messages in iCloud: complete with attached media files and documents Safari (browsing history, bookmarks, tabs opened on user's devices) Calendars, notes, contacts Call logs (information about calls made and received) Apple Maps (routes, places, searches) Wi-Fi (wireless access points, MAC addresses, date and device added) Wallet (everything except payment data) Account info (comprehensive information about the user and devices registered on the Apple ID account) Multimedia Gallery Elcomsoft Phone Viewer can display pictures and videos captured with the phone or saved by one of the many apps. But don't you worry, there won't be a big mess of thousands of images appearing in a single thumbnail gallery. The files will be automatically split into a number of categories, making it easy to discover which pictures were captured with the phone's camera, or received as messages or attachments. A separate category filters out system and application images such as buttons, logos and splash screens. Album view is available to allow you better navigate through thousands of images. Aggregated Locations Multiple sources of location data may be available in a given backup or image. Location data may be found in calendar events, iMessage attachments, map caches and system logs. Geolocation is one of the most important EXIF tags available. Elcomsoft Phone Viewer will automatically extract location data from multiple sources, and map the locations with Google Maps. The ability to map GPS coordinates extracted from multiple sources can become extremely handy during investigations. TAR Images: The iOS File System Since the introduction of the iPhone 5s, Apple's first 64-bit iPhone, physical acquisition has never been the same. For all iPhone and iPad devices equipped with Apple's 64-bit processors, physical acquisition is exclusively available via file system imaging. The imaging is performed on the device itself in order to bypass full-disk encryption. Regardless of the tool performing physical acquisition, the result of these efforts is always a TAR archive containing an image of the device's file system. Elcomsoft iOS Forensic Toolkit produces TAR files as the result of the "F" (File System) command. Up until now, most tools available for analyzing information inside these TAR images were integral parts of fully-featured forensic toolkits. The expert's choice would be limited to either time-consuming and labour-intensive manual analysis requiring a high level of expertise, or a highly sophisticated and complex forensic suite, with nothing in between. Elcomsoft Phone Viewer offers the lightweight and convenient third option, enabling fast and easy analysis of evidence found in the results of physical acquisition. What's new added preliminary support for iOS 14 backups (local and iCloud) added support for .tar files created with Magnet AXIOM Acquire improved Wi-Fi connections parsing fixed the problem processing media files under certain circumstances fixed the problem parsing notes attachments fixed the problem on data export when the path contains non-latin characters HOMEPAGE
  13. File size: 54.86 MB Recover lost and forgotten passwords to Intuit Quicken and QuickBooks files, including many localized and international variants. Advanced Intuit Password Recovery attacks passwords and unlocks Intuit Quicken .QDF documents and instantly unlocks password-protected and QuickBooks .QBW files. Advanced Intuit Password Recovery employs highly effective hardware acceleration to speed up Quicken password recovery using consumer-grade video cards made by AMD and NVIDIA. As a result, Advanced Intuit Password Recovery is capable of attacking up to 1.2 million passwords per second using a single NVIDIA GTX 1080 video card. Last-generation NVIDIA boards are supported through CUDA 10. Supported Products: • Quicken versions 2006 through 2020 (password recovery) • QuickBooks versions 2006 through 2021 (instant unlock) • Most non-US versions of Quicken and QuickBooks • International versions e.g. versions Supported File Formats • Intuit Quicken .QDF • QuickBooks .QBW Whats New: HOMEPAGE
  14. File Size: 24.6 MB Advanced Mailbox Password Recovery instantly retrieves the locally stored login and password information protecting email accounts and profiles, and supports many popular email clients. With the help of the included POP3/IMAP Server Emulator, Advanced Mailbox Password Recovery retrieves passwords to POP3 and IMAP accounts from all email clients in existence. Universal Compatibility Advanced Mailbox Password Recovery can recover login and password information to POP3 and IMAP accounts from any email client in existence. The included POP3/IMAP Server Emulator intercepts the login and password information sent to an email server. Mobile Clients Forgetting a POP3 or IMAP password on a mobile client such as a cell phone or Windows Mobile communicator may be impossible to recover without Advanced Mailbox Password Recovery, but could not be easier with it. Just replace the POP3/IMAP server on the mobile device with the address of POP3/IMAP Server Emulator, and Advanced Mailbox Password Recovery will intercept and display the password the moment your mobile device connects to the server to check for new messages. Local Account Operation Please note that Advanced Mailbox Password Recovery can recover lost or forgotten password from the local account only, and requires you to be logged in to the system. This product cannot be used to retrieve somebody else's passwords. What's new: official site does not provide any info about changes in this version. HOMEPAGE
  15. Languages: English | File Size: 119.21 MB Perform physical and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image. - Physical acquisition for 32-bit and 64-bit iOS devices via jailbreak - Logical acquisition with iTunes-style backup includes decrypted keychain - Unlocks iOS devices with pairing records (lockdown files) - Decrypts keychain items and extracts device keys - Real-time file system acquisition for jailbroken devices - Quickly extracts media and shared files, even if backup password is set Enhanced Forensic Access to iPhone/iPad/iPod Devices running Apple iOS Perform the complete forensic acquisition of user data stored in iPhone/iPad/iPod devices. Elcomsoft iOS Forensic Toolkit allows imaging devices' file systems, extracting device secrets (passcodes, passwords, and encryption keys) and decrypting the file system image. Access to most information is provided instantly. Please note that some models require jailbreaking. See Compatible Devices and Platforms for details. Physical Acquisition for Legacy, 32-bit and 64-bit Apple Devices Physical acquisition is the only acquisition method to extract full application data, downloaded messages and location history. Physical acquisition operates on fixed-timeframe basis, which guarantees the delivery of the entire content of a 32-GB device in 40 minutes or less (depending on the amount of information stored in the device). In many cases, physical acquisition returns more data than logical acquisition, as many files are locked by the operating system and not accessible during the process of logical acquisition. Elcomsoft iOS Forensic Toolkit supports both legacy hardware (iPhone 4 and older), jailbroken 32-bit devices (iPhone 4S through 5C) and jailbroken 64-bit devices (iPhone 5s through iPhone X). A proprietary acquisition technique is exclusively available in Elcomsoft iOS Forensic Toolkit for 64-bit devices. Physical acquisition for 64-bit devices is fully compatible with jailbroken iPhones and iPads equipped with 64-bit SoC, returning the complete file system of the device (as opposed to bit-precise image extracted with the 32-bit process). Only devices with known or empty passcode are supported; passcode protection must be removed in iOS settings prior to acquisition. Logical Acquisition with Keychain Extraction iOS Forensic Toolkit supports logical acquisition, a simpler and safer acquisition method compared to physical. Logical acquisition produces a standard iTunes-style backup of information stored in the device. While logical acquisition returns less information than physical, experts are recommended to create a logical backup of the device before attempting more invasive acquisition techniques. Logical acquisition with iOS Forensic Toolkit is the only acquisition methods allowing access to encrypted keychain items. Logical acquisition should be used in combination with physical for extracting all possible types of evidence. Media and Shared Files Extraction iOS Forensic Toolkit offers the ability to quickly extract media files such as Camera Roll, books, voice recordings, and iTunes media library. As opposed to creating a local backup, which could be a potentially lengthy operation, media extraction works quickly and easily on all supported devices. Extraction from locked devices is possible by using a pairing record (lockdown file). In addition to media files, iOS Forensic Toolkit can extract stored files of multiple apps, extracting crucial evidence from 32-bit and 64-bit devices without a jailbreak. While access to app data without a jailbreak is limited, this new technique allows extracting Adobe Reader and Microsoft Office locally stored documents, MiniKeePass password database, and a lot more. The extraction requires an unlocked device or a non-expired lockdown record. If a lockdown record is used, some files may not be accessible unless the lock screen passcode is removed. Perform physical and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image. All Features and Benefits - Physical Acquisition for 32-bit and 64-bit iOS Devices - Logical Acquisition with Lockdown Support and Keychain Extraction - Access More Information than Available in iPhone Backups - Keychain Recovery - Passcode Recovery RELEASE NOTES: - Support for iPhone 4 is back due to popular request - iPhone 4 and 5: passcode unlock is implemented - iPhone 4, 5 and 5c: full physical acquisition (decryption of disk image) is implemented - iPhone 4 and 5: keychain is now acquired in XML format Compatible Devices and Platforms: - 64-bit iOS devices with jailbreak: physical acquisition (file system extraction, keychain decryption) - Apple TV 4 (cable connection) and Apple TV 4K (wireless connection through Xcode, Mac only) - Apple Watch (all generations); requires a third-party IBUS adapter - No jailbreak: advanced logical acquisition only [1] Logical acquisition includes: - Extended information about the device - iTunes-format backup (includes many keychain items) - List of installed apps - Media files (even if the backup is password-protected) - Shared files (even if the backup is password-protected) System Requirements: - Windows Server 2016 - Windows Server 2012 - Windows 7 (32 bit) - Windows 7 (64 bit) - Windows 8 - Windows 8.1 - Windows 10 HOMEPAGE

Board Life Status


Board startup date: May 07, 2019 15:12:43
×
×
  • Create New...
Copyright© 2020 Crackians.com