???

  • Autor: Vários
  • Narrador: Vários
  • Editora: Podcast
  • Mais informações

Informações:

Sinopse

Episódios

  • iOS Extraction Without a Jailbreak: iOS 9 through iOS 13.7 on All Devices

    03/12/2020

    After adding jailbreak-free extraction for iOS 13.5.1 through 13.7, we now support every Apple device running any version of iOS from 9.0 through 13.7 with no gaps or exclusions. For the first time, full file system extraction and keychain decryption are possible on all devices running these iOS versions. Full iOS 13 support without a […]

  • Elcomsoft vs. Hashcat Part 3: Attacks, Costs, Performance and Extra Features

    02/12/2020

    Elcomsoft Distributed Password Recovery and Hashcat support a number of different attacks ranging from brute-force all the way to scriptable, dictionary-based attacks. The costs and performance are extremely important factors. We charge several hundred dollars for what, in the end, can be done with a free tool. Which tool has better performance, and are the […]

  • Forensically Sound Cold System Analysis

    01/12/2020

    As opposed to live system analysis, experts performing the cold analysis are not dealing with authenticated user sessions. Instead, cold analysis can be viewed as an intermediary measure with live system analysis on the one end and the examination of a forensic disk image on another. Why and when would you use cold system analysis, […]

  • The ABC’s of Password Cracking: The True Meaning of Speed

    30/11/2020

    When adding a new encryption format or comparing the performance of different password recovery tools, we routinely quote the recovery speed expressed in the number of passwords per second. But what is the true meaning of password recovery speeds? Do the speeds depend solely, or at all, on the encryption algorithm? What’s “military grade” encryption, […]

  • Elcomsoft System Recovery: a Swiss Army Knife of Desktop Forensics

    26/11/2020

    Accessing a locked system is always a challenge. Encrypted disks and encrypted virtual machines, encrypted files and passwords are just a few things to mention. In this article we are proposing a straightforward workflow for investigating computers in the field. Note: you may be able to perform live system analysis if the computer being investigated […]

  • Elcomsoft vs. Hashcat Part 2: Workflow, Distributed and Cloud Attacks

    25/11/2020

    The user interface is a major advantage of Elcomsoft tools. Setting up attacks in Elcomsoft Distributed Password Recovery is simpler and more straightforward compared to the command-line tool. In this article, we’ll talk about the general workflow, the use and configuration of distributed and cloud attacks in both products. We received lots of feedback after […]

  • Elcomsoft vs. Hashcat: Addressing Feedback

    25/11/2020

    After publishing the first article in the series, we received numerous comments challenging our claims. We carefully reviewed every comment, reread and reevaluated our original article.  Elcomsoft vs. Hashcat Rev.1.1 is here. The unsupported algorithms In our original article, we made the following claim: “While both Hashcat and Elcomsoft Distributed Password Recovery advertise hundreds of […]

  • Extracting Evidence from iPhone Devices: Do I (Still) Need a Jailbreak?

    23/11/2020

    If you are familiar with iOS acquisition methods, you know that the best results can be obtained with a full file system acquisition. However, extracting the file system may require jailbreaking, which may be risky and not always permitted. Are there any reasons to use jailbreaks for extracting evidence from Apple devices? In the time […]

  • Mobile Forensics – Advanced Investigative Strategies

    16/11/2020

    Four years ago, we published our first book: Mobile Forensics – Advanced Investigative Strategies. We are really proud of this achievement. Do you want to know the story behind it and what’s changed since then in mobile and cloud forensics? Here are some insides (but please do not tell anyone!) If you read “Novel Notes” […]

  • Apple Watch Forensics Reloaded

    13/11/2020

    Is it possible to extract any data from an Apple Watch? It’s relatively easy if you have access to the iPhone the device is paired to, or if you have a backup of that iPhone. But what if the watch is all you have? If there is no paired iPhone, no backup and no iCloud […]

  • iOS 14.2, iOS 12.4.9, the Updated checkra1n 0.12 Jailbreak and File System Extraction

    11/11/2020

    It’s been a week since Apple has released iOS 14.2 as well as iOS 12.4.9 for older devices. Just a few days later, the developers updated the checkra1n jailbreak with support for new devices and iOS versions. What does that mean for iOS forensics? Let’s have a look; we have done some testing, and our […]

  • Protecting iMessage Communications

    04/11/2020

    How secure are your chats in your favorite instant messenger? Can someone intercept and read your secret conversations, and can you do something about it? Apple users have access to the highly popular instant messaging system, the iMessage. But how secure it really is? Let’s find out. When it comes to instant messaging, there are […]

  • Breaking Intuit Quicken and QuickBooks Passwords in 2021

    02/11/2020

    Intuit Quicken is one of the oldest tools of its kind. Over the years, Quicken had become the de facto standard for accounting, tax reporting and personal finance management in North America. Finances is an extremely sensitive area that demands adequate protection of the user data. However, prior to 2003, Quicken employed a weak protection […]

  • Five Hundred Posts

    30/10/2020

    Believe me or not, but this is exactly the 500th post in our blog! The first one was posted in March 2009 and was about Distributed Password Recovery and GPU acceleration. At that time, we even did not do mobile or cloud forensics. Today it’s not about our achievements. I want to thank you for […]

  • The Forensic View of iMessage Security

    29/10/2020

    Apple iMessage is an important communication channel and an essential part of forensic acquisition efforts. iMessage chats are reasonably secure. Your ability to extract iMessages as well as the available sources of extraction will depend on several factors. Let’s discuss the factors that may affect your ability to extract, and what you can do to […]

  • May the [Brute] Force Be with You!

    28/10/2020

    Remember the good old times when there was a lot of applications with “snake oil” encryption? You know, the kind of “peace of mind” protection that allowed recovering or removing the original plaintext password instantly? It is still the case for a few “we-don’t-care” apps such as QuickBooks 2021, but all of the better tools […]

  • Extracting the iPhone: (No) Tools Required?

    27/10/2020

    If the iPhone is locked with a passcode, it is considered reasonably secure. The exception are some older devices, which are relatively vulnerable. But what if the passcode is known or is not set? Will it be easy to gain access to all of the data stored in the device? And why do we have […]

  • 13 Years of GPU Acceleration

    22/10/2020

    Today, we have an important date. It’s been 13 years since we invented a technique that reshaped the landscape of modern password recovery. 13 years ago, we introduced GPU acceleration in our then-current password recovery tool, enabling the use of consumer-grade gaming video cards for breaking passwords orders of magnitude faster. With today’s proliferation of […]

  • iOS Extraction Without a Jailbreak: Finally, Zero-Gap Coverage for iOS 9 through iOS 13.5 on All Devices

    21/10/2020

    We have plugged the last gap in the range of iOS builds supported on the iPhone 5s and 6. The full file system extraction and keychain decryption is now possible on these devices regardless of the version of iOS they are running – at least if that’s iOS 9 or newer. For all other iOS […]

  • The Rise of the Virtual Machines

    20/10/2020

    Criminals are among the most advanced users of modern technology. They learned how to hide information in their smartphones and how to encrypt their laptops. They communicate via secure channels. Their passwords never leak, and they do their best to leave no traces. Forensic investigators encounter new challenges every other day. In this article, we […]

página 2 de 4