VeraCrypt and TrueCrypt continue to be two of the most complex types of encryption to bypass. Both tools provide an option to use keyfiles for encrypting volumes. The content of the keyfile (or multiple keyfiles) is combined with the password, … Read more
Apple takes privacy, security, and encryption very seriously. While the latest improvements in macOS and iOS security help users to keep their data safe, they also create additional challenges for forensic examiners.
All the latest Apple computers are protected with … Read more
Passware Kit 2020 v1 introduces a built-in Dictionary Manager, support for VeraCrypt GPT system encryption, and optimized decryption process for hard drives.
The new version also extracts passwords from Windows 10/8 standalone systems protected with Windows Hello: PIN and Picture … Read more
The Passware team has analyzed over 4 billion real user passwords and gathered data on the latest trends on password use.
ABOUT THE RESEARCH
As sources of passwords, we have merged leaked passwords databases available over the internet, passwords recovered … Read more
- Instant decryption of Symantec Endpoint Encryption disks via live memory analysis
- Support for additional VeraCrypt encryption algorithms
- Optimized password recovery for TrueCrypt/VeraCrypt
- Support for EnCase EX01 image files format
- Export and import of dictionaries
- Saving MS Office encryption
Did you know that Passware Kit can create a snapshot of a password recovery process at any time and resume it on a different computer?
Running a password recovery attack, especially for multiple files or drives, might be a long … Read more
Passware Kit 2019 v3 instantly decrypts LUKS volumes via live memory analysis, extracts passwords and other data from macOS High Sierra keychains, and is twice as fast in recovering iTunes backup passwords on GPU than previous versions.
The new version … Read more
Decrypting BitLocker volumes or images is challenging due to the various encryption options offered by BitLocker that require different information for decryption.
This article explains BitLocker protectors and talks about the best ways to get the data decrypted, even for … Read more
- Extraction of iCloud keychain records
- Export and import of password recovery state
- Password recovery for LastPass databases
- Passwords extraction from 1Password databases
- Instant decryption of VeraCrypt volumes for Linux
- Password recovery for LUKS: support for an additional encryption