Quantcast
Channel: GPU acceleration – ElcomSoft blog
Browsing all 33 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Distributed Password Recovery: Faster, Smarter and Cost-Effective

We have just released a long-awaited update to one of our flagship products, Elcomsoft Distributed Password Recovery. While you can learn more about what’s been added and changed from our official...

View Article



Image may be NSFW.
Clik here to view.

Cracking Wi-Fi Passwords with Sethioz

If you care about password cracking, hardware acceleration or Wi-Fi protection this interview with our friend Sethioz is certainly for you. Being currently a freelance security tester Sethioz kindly...

View Article

Elcomsoft Distributed Password Recovery Video Tutorial

Anyone considering the possibility to purchase Elcomsoft Distributed Password Recovery has a wonderful opportunity to explore the program together with Sethioz and get a clearer understanding of how...

View Article

Image may be NSFW.
Clik here to view.

Elcomsoft Distributed Password Recovery Updated with OS X Keychain Support...

We’ve recently updated Elcomsoft Distributed Password Recovery, adding enhanced GPU-assisted recovery for many supported formats. In a word, the new release adds GPU-accelerated recovery for OS X...

View Article

Image may be NSFW.
Clik here to view.

BitLocker: What’s New in Windows 10 November Update, And How To Break It

BitLocker is a popular full-disk encryption scheme employed in all versions of Windows (but not in every edition) since Windows Vista. BitLocker is used to protect stationary and removable volumes...

View Article


Image may be NSFW.
Clik here to view.

NVIDIA Pascal: a Great Password Cracking Tool

During the last several years, progress on the CPU performance front has seemingly stopped. Granted, last-generation CPUs are cool, silent and power-efficient. Anecdotal evidence: my new laptop (a...

View Article

Image may be NSFW.
Clik here to view.

Breaking BitLocker Encryption: Brute Forcing the Backdoor (Part II)

How often do you think forensic specialists have to deal with encrypted containers? Compared with office documents and archives that are relatively infrequent, every second case involves an encrypted...

View Article

Image may be NSFW.
Clik here to view.

Building a Distributed Network in the Cloud: Using Amazon EC2 to Break Passwords

Not all passwords provide equal protection. Some formats are more resistant to brute-force attacks than others. As an example, Microsoft Office 2013 and 2016 employ a smart encryption scheme that is...

View Article


Image may be NSFW.
Clik here to view.

How to Break 30 Per Cent of Passwords in Seconds

Share List This article opens a new series dedicated to breaking passwords. It’s no secret that simply getting a good password recovery tool is not enough to successfully break a given password....

View Article


Image may be NSFW.
Clik here to view.

Using Intel Built-in Graphic Cores to Accelerate Password Recovery

GPU acceleration is the thing when you need to break a password. Whether you use brute force, a dictionary of common words or a highly customized dictionary comprised of the user’s existed passwords...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Office encryption evolution: from Office 97 to Office 2019

The first Microsoft Office product was announced back in 1988. During the past thirty years, Microsoft Office has evolved from a simple text editor to a powerful combination of desktop apps and cloud...

View Article

What is Password Recovery and How It Is Different from Password Cracking

Why wasting time recovering passwords instead of just breaking in? Why can we crack some passwords but still have to recover the others? Not all types of protection are equal. There are multiple types...

View Article

Image may be NSFW.
Clik here to view.

Breaking VeraCrypt containers

VeraCrypt is a de-facto successor to TrueCrypt, one of the most popular cryptographic tools for full-disk encryption of internal and external storage devices. Compared to TrueCrypt, which it...

View Article


Image may be NSFW.
Clik here to view.

Using Microsoft Azure to Break Passwords

Modern applications use highly secure and thus deliberately slow algorithms for verifying passwords. For this reason, the password recovery process may take a lot of time and require extreme...

View Article

Image may be NSFW.
Clik here to view.

Breaking LastPass: Instant Unlock of the Password Vault

Password managers such as LastPass are designed from the ground up to withstand brute-force attacks on the password database. Using encryption and thousands of hash iterations, the protection is made...

View Article


Image may be NSFW.
Clik here to view.

Breaking Encrypted Virtual Machines: Recovering VMWare, Parallels, and...

Virtual machines use a portable, hardware-independent environment to perform essentially the same role as an actual computer. Activities performed under the virtual umbrella leave trails mostly in the...

View Article

Image may be NSFW.
Clik here to view.

Ruling Out the Encryption

We all have habits. Morning coffee (no sugar, just some milk), two eggs (sunny side up), reading mail wile you are not completely awaken, and a lot more. We all follow some kind of rules we have set...

View Article


Image may be NSFW.
Clik here to view.

The Rise of the Virtual Machines

Criminals are among the most advanced users of modern technology. They learned how to hide information in their smartphones and how to encrypt their laptops. They communicate via secure channels. Their...

View Article

Image may be NSFW.
Clik here to view.

13 Years of GPU Acceleration

Today, we have an important date. It’s been 13 years since we invented a technique that reshaped the landscape of modern password recovery. 13 years ago, we introduced GPU acceleration in our...

View Article

Image may be NSFW.
Clik here to view.

May the [Brute] Force Be with You!

Remember the good old times when there was a lot of applications with “snake oil” encryption? You know, the kind of “peace of mind” protection that allowed recovering or removing the original plaintext...

View Article
Browsing all 33 articles
Browse latest View live




Latest Images