Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Password Recovery Tools


Published on

Published in: Technology
  • Why are men so heartless??!!! I've been married for over 20 years with two beautiful kids to my high school love. I know we might have rushed things a bit but we were in love and everything was good not until he started seeing someone else for reasons I just can't understand. He started acting up and didn't have any regard for me or the kids. I endured till it got unbearable and he filed for a divorce. My lawyer told me the best thing for me to gain something from the divorce is to get some dirt on my husband and he introduced me to a hacker. Without wasting time I contacted the hacker and told him I wanted to hack my husband... his phone, email everything. I was a bit skeptical because I read a lot of things about scammers on the internet but I was assured by a lot of positive reviews about this hacker so I went ahead. The hacker got into my husband's phone and social account and got me enough proof that my husband was indeed cheating. Thus really helped my case. I can't thank my lawyer and the hacker enough. I couldn't save my marriage but I could save my kids and got little to fend on which us ok as long as I'm not being cheated on or lied to. I'll recommend (Blackbutcher.hacker@ outlook. com) to anyone. He's the hacker who helped me win my case. I read a lot about other good things he does like boosting credit scores and clearing credit card debts. I'll be in contact with him on that and see how it goes but I know he's reliable.
    Are you sure you want to  Yes  No
    Your message goes here
  • i have tested her and i need to tell you all she's legit and affordable. Godeyeviewhacker AT hotmail DOT com is the best hacker alive. I was lost with no hope when my credit score was low as 580 and i'm broke as hell because i was ripped by some fake group calling themselves hackers. I contact the God eye and i was told to wait for 24 hours after funding exploits and i got to have a good credit score and it's now over 800, I owe her a lot as she has made my life better because i'm not broke anymore. She's also interested in some hacking problems. Cheating spouse, Hacking school grades, Deleting of criminal records, and any hacking problems. get to her on Godeyeviewhacker AT hotmail DOT com and get to look for me to thank me because he's indeed a great guy!
    Are you sure you want to  Yes  No
    Your message goes here

Password Recovery Tools

  1. 1. Password Recovery Solutions Andrey Belenko Security Researcher, CISSP  
  2. 2. More  than  15  years  in  Password  Recovery   Agenda  About us  Types of passwords  Hardware acceleration  Distributed password recovery  QQ passwords  iPhone/iPod/iPad backup passwords
  3. 3. More  than  15  years  in  Password  Recovery   About us   Established in 1990, privately held   Based in Moscow, Russia   Resellers worldwide   Customers from Fortune 500, military and governmental institutions   Patent-pending technologies (GPU acceleration, Thunder Tables)   100+ file formats supported h0p://  
  4. 4. Industry Certified and Acknowledged   Microsoft Gold Certified Partner   Intel Software Partner   NVIDIA Registered Developer   Member of the Association of Shareware Professionals (ASP)   Member of the Russian Cryptology Association (RCA)
  5. 5. Password Protection Types "   Reversible passwords transformation Instant recovery
  6. 6. Instant Recovery
  7. 7. Password Protection Types "   Reversible passwords transformation Instant recovery "   One-way password transformation Can reset password
  8. 8. Password Reset
  9. 9. Password Protection Types "   Reversible passwords transformation Instant recovery "   One-way password transformation Can reset password "   Encrypted documents Break encryption Guess password
  10. 10. Breaking Encryption
  11. 11. Password Guessing
  12. 12. Password Guessing
  13. 13. Problems •  «Salt» – Rainbow tables don’t work •  Strong crypto – Key search attacks not possible •  Iterated transformations – Trying password takes longer Key is to test smart and fast!
  14. 14. How to Increase Speed? So-ware   •  No  special  hardware   OpFmizaFon   •  Limited  speedup  (10-­‐20%)   Special   •  Convenient  to  use   Hardware   •  Not  very  cost-­‐effecFve   Common   •  Cost-­‐effecFve   Hardware   •  Might  require  user  experFse   Distributed   •  Scalable   compuFng   •  Difficult  to  manage  
  15. 15. Supported Hardware GPU: • NVIDIA GeForce • NVIDIA Tesla • ATI Radeon • ATI FireStream
  16. 16. Supported Hardware Tableau TACC1441 (FPGA)
  17. 17. Performance (WPA) 2x  TACC1441   29000   TACC1441   14500   HD5970   103000   GTX  480   30000   GTX  295   22000   Core  i7  920   4000   0   20000   40000   60000   80000   100000   120000   Passwords  per  Second  
  18. 18. Distributed Password Recovery Server LAN Controller Internet/WAN Workers
  19. 19. Distributed Password Recovery •  Needs little traffic and bandwidth •  Can work over LANs and WANs •  Scales (almost) linearly with number of nodes •  Workers can join and leave •  Nodes can use hardware acceleration
  20. 20. QQ Passwords •  Password is not stored in clear •  QQ 2005 stores MD5 hash •  QQ 2009 stores encrypted MD5 hash –  Encryption key depends on hardware •  Can extract hash and run password recovery •  Use any tool for cracking MD5 •  Demo
  21. 21. iPhone Backup Passwords •  100 millions iPhone/iPod touch/iPad sold •  iTunes backs up device regularly •  Backup contains lots of valuable info –  Contacts, call logs, SMS, e-mail accounts –  Photos –  Location history –  Application files (cleartext password)
  22. 22. iPhone Backup Passwords •  Device can encrypt backups •  Need original password to decrypt •  Not same as passcode! Elcomsoft & Oxygen provide solution for handling encrypted backups!
  23. 23. iPhone Password Breaker •  Supports iPhone/iPod touch/iPad backups •  Supports iOS 4 and iTunes 9.2 •  Wordlist and bruteforce attacks •  Hardware acceleration with NVIDIA and ATI GPUs and Tableau TACC1441 •  Use Oxygen Forensic Suite to decrypt and analyze
  24. 24. Thank You!