SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Data Decryption &
Password Recovery
How Special Tools Facilitate Investigations



                                       !"#$%&'()"*
Who are we?

• Founded in 1990
• In password recovery since 1998
• Privately owned
• HQ and Dev in Moscow, Russia
• Four US patents issued, more to come
Products
Overview
Stored Passwords
Browsers    Mail        IMs
Protected Files
Office         PDF         Archives
Protected Files
PGP       WordPerfect   Accounting
Distributed Recovery
          Many file types
          Works over LANs and
          WANs
          Up to 10’000 nodes
          Hardware acceleration
Audit

Windows Domains   Wireless Networks
Technology
Thunder Tables®
• Recovers encryption key
• Password remains unknown
• Works only with 40-bit encryption
 ‣ MS Word 97-2003, Adobe PDF
 ‣ Word 2007/2010 when saving in .doc
• Can be applied to passwords
• Based on Rainbow Tables
   • TT = RT + Keys not in RT
• Provides guaranteed decryption
       (except for MS Excel files)
• Data fits on DVD or 4 Gb USB stick
• Average key search time is 25 seconds
100%
                                                                                       99.4% 99.9% 100%
                                                                               95.7%
                                                                       89.4%

                  75%                                        77.6%
                                                     69.7%
Keys recovered




             This is dual-core CPU with tables on HDD
                  50%                        54.7%

                 Quad-core with tables on SSD will be way
                           40.2%
                                 faster!
                  25%
                                25.3%
                        17.4%


                  0%
                    1 sec. 2 sec. 5 sec. 10 sec. 20 sec. 30 sec. 1 min. 2 min. 5 min. 10 min. 15 min.
                                                     Attack duration
Demo
GPU Acceleration
• Order of magnitude faster than CPU
• Competing vendors: NVIDIA and ATI
• Hardware readily available
 ‣ Consumer- and enterprise-grade solutions
 ‣ Very competitive hardware pricing
Core i7-920       1,000




GeForce 295               8,200




GeForce 480                    11,300




Radeon 5970                                                            39,000


              0           10,000           20,000            30,000   40,000
                              Office 2007, Passwords per Second
TACC Acceleration
• Times faster than CPU
• Very easy to use
 ‣ No drivers
 ‣ Portable
• Low power consumption (   no overheating)

• Scales easily
1,000
Core i7-920
                  $250



                                             2,500
TACC1441
                                                                     $4,000



                                                                                5,000
Tesla C1060
                                 $1,500


              0          1,250            2,500              3,750            5,000
                             Office 2007, Passwords per Second
Technology lets
do more in less time!
New Products &
   Features
Elcomsoft Phone
Password Breaker
Elcomsoft Phone
         Password Breaker
• Recovers passwords for mobile devices
  backups
• Works offline (device is not needed)
• Decrypts backups (you can use favorite
  mobile forensics tools)
• Recovers passwords stored in Keychain
• GPU & TACC acceleration
iOS 4.x Backup
              Security
• Password verification is done on the device
 ‣ PBKDF2-SHA1 with 10’000 iterations
 ‣ Was 2000 iterations in iPhoneOS 3.x
• No data leaves device unencrypted
 ‣ AES-256, per-file key and IV
Backup password



               Backup keybag       Backup master key




Encrypted FEK and IV   FEK encryption key




     AES-256 key and IV to decrypt file
iOS 4.x Keychain
              Security
• Keychain is system-wide storage for secrets
  ‣ Sort of Protected Storage for iOS
• Encrypted with device-specific key
• Plain backups include keychain “as-is”
• Encrypted backups include keychain re-
  encrypted on key derived from password
  ‣ The only reliable way to get stored secrets
Blackberry Backup
             Security
• Password verification is done on the PC
 ‣ PBKDF2-SHA1 with 1 (one) iteration
 ‣ Generating 256 bytes of key data, using
    256 bits
• Data encryption done on PC
 ‣ AES-256, single file
    Still think Blackberry is more secure?
Demo
Questions?
Thank you
Data Decryption &
Password Recovery
How Special Tools Facilitate Investigations



                                       !"#$%&'()"*

Contenu connexe

Tendances

Hostingultraso com (11)
Hostingultraso com (11)Hostingultraso com (11)
Hostingultraso com (11)ayan Maity
 
Hostingultraso com (13)
Hostingultraso com (13)Hostingultraso com (13)
Hostingultraso com (13)ayan Maity
 
JetStor NAS 724UX and 724UX 10G ZFS appliance
JetStor NAS 724UX and 724UX 10G ZFS applianceJetStor NAS 724UX and 724UX 10G ZFS appliance
JetStor NAS 724UX and 724UX 10G ZFS applianceGene Leyzarovich
 
Eric Moreau - Samedi SQL - Backup dans Azure et BD hybrides
Eric Moreau - Samedi SQL - Backup dans Azure et BD hybridesEric Moreau - Samedi SQL - Backup dans Azure et BD hybrides
Eric Moreau - Samedi SQL - Backup dans Azure et BD hybridesMSDEVMTL
 
Leveraging OpenStack Cinder for Peak Application Performance
Leveraging OpenStack Cinder for Peak Application PerformanceLeveraging OpenStack Cinder for Peak Application Performance
Leveraging OpenStack Cinder for Peak Application PerformanceNetApp
 
Why does my choice of storage matter with cassandra?
Why does my choice of storage matter with cassandra?Why does my choice of storage matter with cassandra?
Why does my choice of storage matter with cassandra?Johnny Miller
 
Mainframe Hacking - Derbycon 5.0
Mainframe Hacking - Derbycon 5.0Mainframe Hacking - Derbycon 5.0
Mainframe Hacking - Derbycon 5.0bigendiansmalls
 
KoprowskiT_InfoTRAMS_TrustThePrimer
KoprowskiT_InfoTRAMS_TrustThePrimerKoprowskiT_InfoTRAMS_TrustThePrimer
KoprowskiT_InfoTRAMS_TrustThePrimerTobias Koprowski
 
NGS Informatics and Interpretation - Hardware Considerations by Michael McManus
NGS Informatics and Interpretation - Hardware Considerations by Michael McManusNGS Informatics and Interpretation - Hardware Considerations by Michael McManus
NGS Informatics and Interpretation - Hardware Considerations by Michael McManusKnome_Inc
 
Cassandra and Solid State Drives
Cassandra and Solid State DrivesCassandra and Solid State Drives
Cassandra and Solid State DrivesRick Branson
 
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash TechnologyCeph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash TechnologyCeph Community
 
Transparent Encryption in HDFS
Transparent Encryption in HDFSTransparent Encryption in HDFS
Transparent Encryption in HDFSDataWorks Summit
 
Cassandra for the ops dos and donts
Cassandra for the ops   dos and dontsCassandra for the ops   dos and donts
Cassandra for the ops dos and dontsDuyhai Doan
 
1 Dedicated Hosting Unix
1 Dedicated Hosting Unix1 Dedicated Hosting Unix
1 Dedicated Hosting Unixwebhostingguy
 
Share winter 2016 encryption
Share winter 2016 encryptionShare winter 2016 encryption
Share winter 2016 encryptionbigendiansmalls
 
OSS2018_skypeforbusiness_2019
OSS2018_skypeforbusiness_2019OSS2018_skypeforbusiness_2019
OSS2018_skypeforbusiness_2019Konrad Sagala
 
Raid designs in Qsan Storage
Raid designs in Qsan StorageRaid designs in Qsan Storage
Raid designs in Qsan Storageqsantechnology
 
Introduction to TrioNAS LX U300
Introduction to TrioNAS LX U300Introduction to TrioNAS LX U300
Introduction to TrioNAS LX U300qsantechnology
 
Puppet at the centre of everything by David Mytton
Puppet at the centre of everything by David MyttonPuppet at the centre of everything by David Mytton
Puppet at the centre of everything by David MyttonNETWAYS
 

Tendances (20)

Glitch nix
Glitch nixGlitch nix
Glitch nix
 
Hostingultraso com (11)
Hostingultraso com (11)Hostingultraso com (11)
Hostingultraso com (11)
 
Hostingultraso com (13)
Hostingultraso com (13)Hostingultraso com (13)
Hostingultraso com (13)
 
JetStor NAS 724UX and 724UX 10G ZFS appliance
JetStor NAS 724UX and 724UX 10G ZFS applianceJetStor NAS 724UX and 724UX 10G ZFS appliance
JetStor NAS 724UX and 724UX 10G ZFS appliance
 
Eric Moreau - Samedi SQL - Backup dans Azure et BD hybrides
Eric Moreau - Samedi SQL - Backup dans Azure et BD hybridesEric Moreau - Samedi SQL - Backup dans Azure et BD hybrides
Eric Moreau - Samedi SQL - Backup dans Azure et BD hybrides
 
Leveraging OpenStack Cinder for Peak Application Performance
Leveraging OpenStack Cinder for Peak Application PerformanceLeveraging OpenStack Cinder for Peak Application Performance
Leveraging OpenStack Cinder for Peak Application Performance
 
Why does my choice of storage matter with cassandra?
Why does my choice of storage matter with cassandra?Why does my choice of storage matter with cassandra?
Why does my choice of storage matter with cassandra?
 
Mainframe Hacking - Derbycon 5.0
Mainframe Hacking - Derbycon 5.0Mainframe Hacking - Derbycon 5.0
Mainframe Hacking - Derbycon 5.0
 
KoprowskiT_InfoTRAMS_TrustThePrimer
KoprowskiT_InfoTRAMS_TrustThePrimerKoprowskiT_InfoTRAMS_TrustThePrimer
KoprowskiT_InfoTRAMS_TrustThePrimer
 
NGS Informatics and Interpretation - Hardware Considerations by Michael McManus
NGS Informatics and Interpretation - Hardware Considerations by Michael McManusNGS Informatics and Interpretation - Hardware Considerations by Michael McManus
NGS Informatics and Interpretation - Hardware Considerations by Michael McManus
 
Cassandra and Solid State Drives
Cassandra and Solid State DrivesCassandra and Solid State Drives
Cassandra and Solid State Drives
 
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash TechnologyCeph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
 
Transparent Encryption in HDFS
Transparent Encryption in HDFSTransparent Encryption in HDFS
Transparent Encryption in HDFS
 
Cassandra for the ops dos and donts
Cassandra for the ops   dos and dontsCassandra for the ops   dos and donts
Cassandra for the ops dos and donts
 
1 Dedicated Hosting Unix
1 Dedicated Hosting Unix1 Dedicated Hosting Unix
1 Dedicated Hosting Unix
 
Share winter 2016 encryption
Share winter 2016 encryptionShare winter 2016 encryption
Share winter 2016 encryption
 
OSS2018_skypeforbusiness_2019
OSS2018_skypeforbusiness_2019OSS2018_skypeforbusiness_2019
OSS2018_skypeforbusiness_2019
 
Raid designs in Qsan Storage
Raid designs in Qsan StorageRaid designs in Qsan Storage
Raid designs in Qsan Storage
 
Introduction to TrioNAS LX U300
Introduction to TrioNAS LX U300Introduction to TrioNAS LX U300
Introduction to TrioNAS LX U300
 
Puppet at the centre of everything by David Mytton
Puppet at the centre of everything by David MyttonPuppet at the centre of everything by David Mytton
Puppet at the centre of everything by David Mytton
 

En vedette

Manufacturers of Fire Detection Equipment
Manufacturers of Fire Detection EquipmentManufacturers of Fire Detection Equipment
Manufacturers of Fire Detection EquipmentGlobal Fire Equipment
 
AES encryption on modern consumer architectures
AES encryption on modern consumer architecturesAES encryption on modern consumer architectures
AES encryption on modern consumer architecturesGrigore Lupescu
 
Защита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрованияЗащита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрованияVladyslav Radetsky
 
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.Vladyslav Radetsky
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and EncryptionUrvashi Kataria
 
Mobile Device Encryption Systems
Mobile Device Encryption SystemsMobile Device Encryption Systems
Mobile Device Encryption SystemsPeter Teufl
 
Security and Encryption on iOS
Security and Encryption on iOSSecurity and Encryption on iOS
Security and Encryption on iOSGraham Lee
 

En vedette (10)

Manufacturers of Fire Detection Equipment
Manufacturers of Fire Detection EquipmentManufacturers of Fire Detection Equipment
Manufacturers of Fire Detection Equipment
 
AES encryption on modern consumer architectures
AES encryption on modern consumer architecturesAES encryption on modern consumer architectures
AES encryption on modern consumer architectures
 
Защита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрованияЗащита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрования
 
McAfee Endpoint Security 10.1
McAfee Endpoint Security 10.1McAfee Endpoint Security 10.1
McAfee Endpoint Security 10.1
 
McAfee Encryption 2015
McAfee Encryption 2015McAfee Encryption 2015
McAfee Encryption 2015
 
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and Encryption
 
Mobile Device Encryption Systems
Mobile Device Encryption SystemsMobile Device Encryption Systems
Mobile Device Encryption Systems
 
Security and Encryption on iOS
Security and Encryption on iOSSecurity and Encryption on iOS
Security and Encryption on iOS
 
Encryption
EncryptionEncryption
Encryption
 

Similaire à Data Decryption & Password Recovery

Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery ToolsAndrey Belenko
 
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...Masahiko Sawada
 
Ceph Day Tokyo -- Ceph on All-Flash Storage
Ceph Day Tokyo -- Ceph on All-Flash StorageCeph Day Tokyo -- Ceph on All-Flash Storage
Ceph Day Tokyo -- Ceph on All-Flash StorageCeph Community
 
A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?
A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?
A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?DATAVERSITY
 
Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014John Davies
 
Nimble Storage Series A presentation 2007
Nimble Storage Series A presentation 2007Nimble Storage Series A presentation 2007
Nimble Storage Series A presentation 2007Wing Venture Capital
 
Scality S3 Server: Node js Meetup Presentation
Scality S3 Server: Node js Meetup PresentationScality S3 Server: Node js Meetup Presentation
Scality S3 Server: Node js Meetup PresentationScality
 
2013.11.14 Big Data Workshop Michael Browne
2013.11.14 Big Data Workshop Michael Browne2013.11.14 Big Data Workshop Michael Browne
2013.11.14 Big Data Workshop Michael BrowneNUI Galway
 
Oracle Performance On Linux X86 systems
Oracle  Performance On Linux  X86 systems Oracle  Performance On Linux  X86 systems
Oracle Performance On Linux X86 systems Baruch Osoveskiy
 
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...Citrix
 
Nick Fisk - low latency Ceph
Nick Fisk - low latency CephNick Fisk - low latency Ceph
Nick Fisk - low latency CephShapeBlue
 
Hyper-Convergence: Worth the Hype?
Hyper-Convergence: Worth the Hype?Hyper-Convergence: Worth the Hype?
Hyper-Convergence: Worth the Hype?Brian Anderson
 
SQream DB - Bigger Data On GPUs: Approaches, Challenges, Successes
SQream DB - Bigger Data On GPUs: Approaches, Challenges, SuccessesSQream DB - Bigger Data On GPUs: Approaches, Challenges, Successes
SQream DB - Bigger Data On GPUs: Approaches, Challenges, SuccessesArnon Shimoni
 
Deploying ssd in the data center 2014
Deploying ssd in the data center 2014Deploying ssd in the data center 2014
Deploying ssd in the data center 2014Howard Marks
 
Brief History of Graphics Devices
Brief History of Graphics DevicesBrief History of Graphics Devices
Brief History of Graphics DevicesTat Iwamoto
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Netgear Italia
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Netgear Italia
 
Better performance using redis
Better performance using redisBetter performance using redis
Better performance using redisAbhinav Dhasmana
 

Similaire à Data Decryption & Password Recovery (20)

Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
 
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
 
Ceph Day Tokyo -- Ceph on All-Flash Storage
Ceph Day Tokyo -- Ceph on All-Flash StorageCeph Day Tokyo -- Ceph on All-Flash Storage
Ceph Day Tokyo -- Ceph on All-Flash Storage
 
A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?
A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?
A Case Study of NoSQL Adoption: What Drove Wordnik Non-Relational?
 
The Smug Mug Tale
The Smug Mug TaleThe Smug Mug Tale
The Smug Mug Tale
 
Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014
 
Nimble Storage Series A presentation 2007
Nimble Storage Series A presentation 2007Nimble Storage Series A presentation 2007
Nimble Storage Series A presentation 2007
 
Scality S3 Server: Node js Meetup Presentation
Scality S3 Server: Node js Meetup PresentationScality S3 Server: Node js Meetup Presentation
Scality S3 Server: Node js Meetup Presentation
 
2013.11.14 Big Data Workshop Michael Browne
2013.11.14 Big Data Workshop Michael Browne2013.11.14 Big Data Workshop Michael Browne
2013.11.14 Big Data Workshop Michael Browne
 
Oracle Performance On Linux X86 systems
Oracle  Performance On Linux  X86 systems Oracle  Performance On Linux  X86 systems
Oracle Performance On Linux X86 systems
 
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
 
Nick Fisk - low latency Ceph
Nick Fisk - low latency CephNick Fisk - low latency Ceph
Nick Fisk - low latency Ceph
 
Hyper-Convergence: Worth the Hype?
Hyper-Convergence: Worth the Hype?Hyper-Convergence: Worth the Hype?
Hyper-Convergence: Worth the Hype?
 
SQream DB - Bigger Data On GPUs: Approaches, Challenges, Successes
SQream DB - Bigger Data On GPUs: Approaches, Challenges, SuccessesSQream DB - Bigger Data On GPUs: Approaches, Challenges, Successes
SQream DB - Bigger Data On GPUs: Approaches, Challenges, Successes
 
Deploying ssd in the data center 2014
Deploying ssd in the data center 2014Deploying ssd in the data center 2014
Deploying ssd in the data center 2014
 
Brief History of Graphics Devices
Brief History of Graphics DevicesBrief History of Graphics Devices
Brief History of Graphics Devices
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
 
Better performance using redis
Better performance using redisBetter performance using redis
Better performance using redis
 
Qnap event v1.6
Qnap   event v1.6Qnap   event v1.6
Qnap event v1.6
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Data Decryption & Password Recovery

  • 1. Data Decryption & Password Recovery How Special Tools Facilitate Investigations !"#$%&'()"*
  • 2. Who are we? • Founded in 1990 • In password recovery since 1998 • Privately owned • HQ and Dev in Moscow, Russia • Four US patents issued, more to come
  • 5. Protected Files Office PDF Archives
  • 6. Protected Files PGP WordPerfect Accounting
  • 7. Distributed Recovery Many file types Works over LANs and WANs Up to 10’000 nodes Hardware acceleration
  • 8. Audit Windows Domains Wireless Networks
  • 11. • Recovers encryption key • Password remains unknown • Works only with 40-bit encryption ‣ MS Word 97-2003, Adobe PDF ‣ Word 2007/2010 when saving in .doc • Can be applied to passwords
  • 12. • Based on Rainbow Tables • TT = RT + Keys not in RT • Provides guaranteed decryption (except for MS Excel files) • Data fits on DVD or 4 Gb USB stick • Average key search time is 25 seconds
  • 13. 100% 99.4% 99.9% 100% 95.7% 89.4% 75% 77.6% 69.7% Keys recovered This is dual-core CPU with tables on HDD 50% 54.7% Quad-core with tables on SSD will be way 40.2% faster! 25% 25.3% 17.4% 0% 1 sec. 2 sec. 5 sec. 10 sec. 20 sec. 30 sec. 1 min. 2 min. 5 min. 10 min. 15 min. Attack duration
  • 14. Demo
  • 16. • Order of magnitude faster than CPU • Competing vendors: NVIDIA and ATI • Hardware readily available ‣ Consumer- and enterprise-grade solutions ‣ Very competitive hardware pricing
  • 17. Core i7-920 1,000 GeForce 295 8,200 GeForce 480 11,300 Radeon 5970 39,000 0 10,000 20,000 30,000 40,000 Office 2007, Passwords per Second
  • 19. • Times faster than CPU • Very easy to use ‣ No drivers ‣ Portable • Low power consumption ( no overheating) • Scales easily
  • 20. 1,000 Core i7-920 $250 2,500 TACC1441 $4,000 5,000 Tesla C1060 $1,500 0 1,250 2,500 3,750 5,000 Office 2007, Passwords per Second
  • 21. Technology lets do more in less time!
  • 22. New Products & Features
  • 24. Elcomsoft Phone Password Breaker • Recovers passwords for mobile devices backups • Works offline (device is not needed) • Decrypts backups (you can use favorite mobile forensics tools) • Recovers passwords stored in Keychain • GPU & TACC acceleration
  • 25. iOS 4.x Backup Security • Password verification is done on the device ‣ PBKDF2-SHA1 with 10’000 iterations ‣ Was 2000 iterations in iPhoneOS 3.x • No data leaves device unencrypted ‣ AES-256, per-file key and IV
  • 26. Backup password Backup keybag Backup master key Encrypted FEK and IV FEK encryption key AES-256 key and IV to decrypt file
  • 27. iOS 4.x Keychain Security • Keychain is system-wide storage for secrets ‣ Sort of Protected Storage for iOS • Encrypted with device-specific key • Plain backups include keychain “as-is” • Encrypted backups include keychain re- encrypted on key derived from password ‣ The only reliable way to get stored secrets
  • 28. Blackberry Backup Security • Password verification is done on the PC ‣ PBKDF2-SHA1 with 1 (one) iteration ‣ Generating 256 bytes of key data, using 256 bits • Data encryption done on PC ‣ AES-256, single file Still think Blackberry is more secure?
  • 29. Demo
  • 32. Data Decryption & Password Recovery How Special Tools Facilitate Investigations !"#$%&'()"*