When auditing my client's networks and applications for weak passwords, I require a tool set that is dependable and fast. From time to time, I'll also receive a request to recover a lost password protecting a critical document or spreadsheet. Elcomsoft has delivered the desired results each and every time! I want to thank Elcomsoft for providing the best password auditing and recovery tools on the market.
Elcomsoft tools for Mobile Forensics are something unique in the field and I really appreciate the efforts of the company trying to find new solutions and weakness that can help us in our daily job. Elcomsoft Phone Breaker and iOS Forensic Toolkit are mandatory in my forensic tools arsenal when I have to deal with iOS devices!
Its rare to find software that actually works EXACTLY the way it promises.
17 December, 2020
Elcomsoft Doubles Password Recovery Speeds with NVIDIA Ampere, Breaks Jetico BestCrypt Containers23 November, 2020
Elcomsoft System Recovery: a Swiss Army Knife of Desktop Forensics20 October, 2020
Elcomsoft Helps Investigators Access Evidence in Encrypted Virtual Machines, Adds Rule Editor18 August, 2020
ElcomSoft Breaks LUKS EncryptionPaper we will analyze applications designed to facilitate storing and management of passwords on mobile platforms, such as Apple iOS and BlackBerry. We will specifically focus our attention on the security of data at rest. We will show that many password keeper apps fail to provide claimed level of protection.
The easy way to restore access passwords to files, applications and databases.
The easy way to restore access passwords to files, applications and databases.
Testing password safety – a key to securing a corporate network.
The easy way to restore access passwords to files, applications and databases.
The easy way to restore access passwords to files, applications and databases.
Advantages of distributed password recovery.
in the corporate information security environment.
What a very interesting interview Aviva Zacks of Safety Detective had with Vladimir Katalov, ElcomSoft’s CEO. Read all about his company’s vision, but don’t ask about their products.
Interview With Vladimir Katalov – ElcomSoft15 October, 2020Safety Detectives
ElcomSoft updates Elcomsoft Phone Viewer, the company’s forensic extraction tool. Version 5.0 gains the ability to display conversation histories and secret chats in Telegram, one of the world’s most popular instant messaging apps.
Elcomsoft Phone Viewer 5.0 gains the ability to display conversation histories and secret chats in Telegram30 April, 2020Help Net Security
In some cases, investigators obtained photos, text messages, call records, browsing data, cookies, and location data from seized iPhones. Some executed search warrants explicitly mention the type of extraction performed, such as so-called "Logical" or "Advanced Logical" extraction. The latter is a term with a meaning that varies between different phone data extraction companies, but generally it relates to creating a device backup as iTunes does normally and obtaining some more data on top of that, Vladimir Katalov, the CEO of iOS forensics firm Elcomsoft, told Motherboard. Katalov said those backups can contain the sorts of pieces of data that investigators obtained, and is available to all models of iPhone.
We Built a Database of Over 500 iPhones Cops Have Tried to Unlock11 March, 2020Vice
23 April, 2020
In this webinar, you'll learn about cloud acquisition of Apple and Google accounts, what data can be extracted from the cloud during a forensic investigation and how. Тoday, cloud acquisition in most cases returns overwhelmingly more data than other data acquisition methods. Apple and Google accounts store media files like photos, videos, screenshots in iCloud Photo Library or Google Photos, passwords in iCloud Keychain, location data in Apple Map or Google Maps, various documents in iCloud Drive or Google Drive, mails and messages and a lot more. Dedicated forensic tools help investigators, examiners and security officers perform cloud forensics with ease and expertise.
Video29 January, 2020
Fitbit and other health trackers: obtaining important evidence you probably did not think about. Find out how smartphones and trackers collect and store health data, and how to obtain health information.
PDF13 November, 2019
Our digital forensic solutions enable experts to gain access to password-protected, locked and encrypted information contained in a range of mobile devices and cloud services, stored in crypto containers or encrypted archives. The company’s parented hardware-accelerated products can break passwords protecting files in a variety of formats, including encryption used in BitLocker, FileVault 2, PGP Disk and TrueCrypt successors' containers.
PDF5 March, 2020
Extracting evidence from a seized iPhone: Using the latest exploits and innovative methods. Collecting data from latest iOS devices without jailbreaking them is possible. The new approach uses an extraction agent that installs onto iOS device. Compared with the traditional mobile forensic method using jailbreak, the use of agent allows us to perform the full file system extraction and decrypt the keychain without the risks and footprint associated with third-party jailbreaks. Details in the presentation.
PDF1 December, 2019
The amount of data collected by health trackers is amazing: from step count and heart rate to running and walking distances with exact timestamps and lots of geolocation data. Some of it goes directly to Apple Health and then to Apple iCloud, while other manufacturers (Samsung or FitBit) keep data in their own clouds. Something goes to Google Fit. Apart from privacy issues, think of how much data can serve as essential evidence during investigations.
PDF6 November, 2019
Latest version of Apple’s mobile operating system actively resist forensic efforts by disabling the less secure biometric identification (Touch ID or Face ID) and blocking USB connectivity after a short period of time. Many of these restrictions can be effectively bypassed with proper timing and the right technique.
PDF