VFC 5 – Now Includes Windows Live ID Exploit (Inc PIN Accounts)

Following on from our July announcement about the successful launch of VFC 5 with all its significant New Features. (Early Customer feedback)

“I have downloaded version 5 and have used it on a couple of occasions recently, I find it more successful in running the VM than version 4, I get less error messages than before especially the one relating to the drive being already in use. So far very happy with the upgrade” – Kevin Mount, Queensland Police, Australia MD5 are now excited to announce another Significant New Feature to be added to Version 5 (from Sept 2019):

The Generic Password Reset (GPR) tool – that enables Windows Live ID exploit (including PIN accounts)

New to VFC 5 the GPR tool can be used to help make powerful system-level changes. With GPR, the investigator can:

• List User Accounts (including password status)
• Bypass security on Windows online (Live ID)
• Reset account passwords to known values (including PIN accounts)
• Open a SYSTEM level command prompt (at the logon screen)
• Easily reboot the guest VM

The response from our Beta Testers

“your new method of breaking on-line ID passwords ….It was flippin awesome…
welcome to the desktop of the virtualised machine for [my suspect]…. Previously unobtainable… took about 3 minutes…..
You lot are AWESOME…..”
Mark Boast, Forensic Analyst, Suffolk Constabulary, UK


AND

Absolutely loving this version, there hasn’t been a password it hasn’t cracked!
Had absolutely no problems putting accounts offline and changing the passwords either through the password bypass ……………… and it worked with password and PIN protected accounts, even 1 which defaulted to a picture based login it changed the local password without a hitch.
Can’t wait for this one to launch as I suspect it will prove uncommonly useful for us.
Peter Bayly, Digital Forensic Investigator, Northumbria Police

Download V5 Windows LiveID full article

To purchase or find out more about VFC version 5 visit the website www.vfc.uk.com or email: [email protected]

Leave a Comment