A Deep Dive into Apple Keychain Decryption

When it comes to the forensic investigation of Apple devices, a Keychain analysis is of particular importance. Not only does Keychain contain passwords from websites and applications, but it can also provide computer forensics with access to the same user’s

Passware Kit Mobile – Now with iOS 15.2 Support

Passware forensic products are used by the world’s top law enforcement agencies to crack cases where decryption is required. Now, the range of decryption solutions is topped up by Passware Kit Mobile – a forensic tool that extracts and decrypts

How To Efficiently Decrypt TrueCrypt/VeraCrypt Encryption Using Passware

VeraCrypt and the former TrueCrypt are two of the most challenging types of encryption to bypass with regard to their popularity as full disk encryption software. Unlike Bitlocker encryption, TrueCrypt/VeraCrypt may encrypt their containers and volumes with multiple encryption keys (cascade

Extracting Passwords From The Acquired Windows Registry

The Microsoft Windows operating system stores passwords and other login data for the installed applications on a system disk in the user profile directory, as well as in a hierarchical Windows registry database. By acquiring this database from a target

Passware Kit Forensic 2020 From Passware

Encryption, passwords, pass codes and other security measures are seemingly the ever-moving target in digital forensics. Whether your investigative focus is mobile devices and trying to bypass or obtain the pass code to collect valuable phone/tablet data; computer systems involved

The New Passware Kit 2020 v4: Mask Attack, Latest iWork, and CSV Reports

The brute-force approach is the most time-consuming password recovery method. We are proud to share that we have introduced Mask attack that significantly reduces the time spent on password recovery by skipping unnecessary character combinations. The new version of Passware

Passware: Tips for Efficient TrueCrypt/VeraCrypt Decryption

VeraCrypt and the former TrueCrypt are two of the most challenging types of encryption to bypass with regard to their popularity as full disk encryption software. Unlike Bitlocker encryption, TrueCrypt/VeraCrypt may encrypt their containers and volumes with multiple encryption keys