SlideShare a Scribd company logo
1 of 2
Download to read offline
ElcomSoft Provides Forensic Access to Encrypted
BitLocker, PGP and TrueCrypt Containers
                                        Moscow, Russia – December 20, 2012 - ElcomSoft Co.
                                        Ltd. announces the release of Elcomsoft Forensic Disk
                                        Decryptor, a forensic tool providing access to information
                                        stored in disks and volumes encrypted with BitLocker,
                                        PGP and TrueCrypt. Supporting several acquisition
                                        modes, Elcomsoft Forensic Disk Decryptor offers
                                        complete access to encrypted information in real time.
                                        Recognizing desktop and portable crypto containers and
                                        offering zero-footprint operation, the new tool becomes an
                                        invaluable tool for investigators, IT security and forensic
                                        specialists.

                                        “Our customers asked us for a tool like this for a long,
                                        long time”, says Vladimir Katalov, ElcomSoft CEO. “We’re
                                        finally releasing a product that’s able to access encrypted
                                        volumes produced by all three popular crypto containers.”

“Before Elcomsoft Forensic Disk Decryptor, only Elcomsoft Distributed Password Recovery could
handle encrypted disks”, says Yuri Konenkov, ElcomSoft leading crypto analytic. “It used brute force to
break passwords. Today, we’re introducing a special tool that uses a completely different approach to
decrypting disks protected with PGP, True Crypt, BitLocker and BitLocker To Go. We have also added
the ability to brute-force passwords for TrueCrypt and BitLocker To Go containers to Elcomsoft
Distributed Password Recovery.”

ElcomSoft also adds True Crypt and BitLocker To Go plugins to Elcomsoft Distributed Password
Recovery, enabling the product to attack plain-text passwords protecting the encrypted containers with
a range of advanced attacks including dictionary, mask and permutation attacks in addition to brute-
force.

About Elcomsoft Forensic Disk Decryptor
Elcomsoft Forensic Disk Decryptor offers forensic specialists a fast, easy way of accessing information
stored in three most popular crypto containers. Supporting desktop and portable versions of BitLocker,
PGP and TrueCrypt, the new tool can either decrypt all files and folders stored in a crypto container or
mount the encrypted volume as new drive letter for instant access.

The complete decryption mode provides full, unrestricted forensic access to all information stored on
encrypted volumes. Alternatively, by mounting encrypted containers as drive letters, investigators gain
immediate, real-time access to protected volumes. In real-time mode, information read from encrypted
containers is decrypted on-the-fly. Elcomsoft Forensic Disk Decryptor offers true zero-footprint
operation with no alterations or modifications to original content ever.
Elcomsoft Forensic Disk Decryptor acquires all necessary decryption keys by analyzing memory dumps
or hibernation files obtained from the target PC. A memory dump can be obtained from a running PC,
locked or unlocked, with encrypted volumes mounted. Memory dumps produced with any forensic
product or obtained via a FireWire attack are supported. A FireWire attack requires a free third-party
tool, a FireWire (IEEE 1394) cable and another PC to launch the attack from. Decryption keys can also
be derived from hibernation files if a target PC is turned off.

“For PGP Disk, one can greatly speed up the key search if the exact encryption algorithm is known”,
comments Yury Konenkov, ElcomSoft's IT security analyst and developer. “Knowing the exact
encryption method is not a given with PGP Disk. Elcomsoft Forensic Disk Decryptor will work either
way, but if the algorithm is known, the program will locate the decryption key sooner.”

In either case, the encrypted volumes must be mounted at the time of acquisition or before the
computer was hibernated. If an encrypted volume is dismounted prior to acquisition, neither memory
dumps nor hibernation files will contain proper decryption keys, and encrypted containers may not be
decrypted without knowing the original plain-text password. If such a password is not known, it can be
recovered with Elcomsoft Distributed Password Recovery.

Compatibility

Elcomsoft Forensic Disk Decryptor runs on all 32-bit and 64-bit editions of Windows XP, Vista, and
Windows 7, as well as Windows 2003 and 2008 Server, and supports BitLocker, BitLocker To Go, PGP
Whole Disk Encryption and TrueCrypt.

Pricing and Availability

Elcomsoft Forensic Disk Decryptor is available immediately. North American prices start from $299.
Local pricing varies.

About ElcomSoft Co. Ltd.

Founded in 1990, ElcomSoft Co.Ltd. is a global industry-acknowledged expert in computer and mobile
forensics providing tools, training, and consulting services to law enforcement, forensics, financial and
intelligence agencies. ElcomSoft pioneered and patented numerous cryptography techniques, setting
and exceeding expectations by consistently breaking the industry’s performance records. ElcomSoft is
Microsoft Gold Independent Software Vendor, Intel Software Premier Elite Partner, member of Russian
Cryptology Association (RCA) and Computer Security Institute.

###

For more information about Elcomsoft Forensic Disk Decryptor visit http://www.elcomsoft.com/efdd.html

More Related Content

Viewers also liked

Polarisation of group ii nitrates
Polarisation of group ii nitratesPolarisation of group ii nitrates
Polarisation of group ii nitratesjadeliu
 
환경건강강좌 강신익의 몸 인문학(2014)
환경건강강좌 강신익의 몸 인문학(2014)환경건강강좌 강신익의 몸 인문학(2014)
환경건강강좌 강신익의 몸 인문학(2014)여성환경연대
 
2016 화장품 미세 플라스틱 간담회 기록 및 후기
2016 화장품 미세 플라스틱 간담회 기록 및 후기2016 화장품 미세 플라스틱 간담회 기록 및 후기
2016 화장품 미세 플라스틱 간담회 기록 및 후기여성환경연대
 
진화하는 소셜 큐레이션 서비스와 관련 기술
진화하는 소셜 큐레이션 서비스와 관련 기술진화하는 소셜 큐레이션 서비스와 관련 기술
진화하는 소셜 큐레이션 서비스와 관련 기술Taegon Kim
 
[IoT] MAKE with Open H/W + Node.JS - 2nd
[IoT] MAKE with Open H/W + Node.JS - 2nd[IoT] MAKE with Open H/W + Node.JS - 2nd
[IoT] MAKE with Open H/W + Node.JS - 2ndPark Jonggun
 
영수증 Bisphenol 보고서(2016)
영수증 Bisphenol 보고서(2016)영수증 Bisphenol 보고서(2016)
영수증 Bisphenol 보고서(2016)여성환경연대
 
1031 아로마테라피
1031 아로마테라피1031 아로마테라피
1031 아로마테라피tae1141
 

Viewers also liked (8)

Polarisation of group ii nitrates
Polarisation of group ii nitratesPolarisation of group ii nitrates
Polarisation of group ii nitrates
 
환경건강강좌 강신익의 몸 인문학(2014)
환경건강강좌 강신익의 몸 인문학(2014)환경건강강좌 강신익의 몸 인문학(2014)
환경건강강좌 강신익의 몸 인문학(2014)
 
I assist guided verilast knee replacement
I assist guided verilast knee replacementI assist guided verilast knee replacement
I assist guided verilast knee replacement
 
2016 화장품 미세 플라스틱 간담회 기록 및 후기
2016 화장품 미세 플라스틱 간담회 기록 및 후기2016 화장품 미세 플라스틱 간담회 기록 및 후기
2016 화장품 미세 플라스틱 간담회 기록 및 후기
 
진화하는 소셜 큐레이션 서비스와 관련 기술
진화하는 소셜 큐레이션 서비스와 관련 기술진화하는 소셜 큐레이션 서비스와 관련 기술
진화하는 소셜 큐레이션 서비스와 관련 기술
 
[IoT] MAKE with Open H/W + Node.JS - 2nd
[IoT] MAKE with Open H/W + Node.JS - 2nd[IoT] MAKE with Open H/W + Node.JS - 2nd
[IoT] MAKE with Open H/W + Node.JS - 2nd
 
영수증 Bisphenol 보고서(2016)
영수증 Bisphenol 보고서(2016)영수증 Bisphenol 보고서(2016)
영수증 Bisphenol 보고서(2016)
 
1031 아로마테라피
1031 아로마테라피1031 아로마테라피
1031 아로마테라피
 

Similar to Forensic Decrypt

Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxBrenoMeister
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
 
White box crytography in an insecure enviroment
White box crytography in an insecure enviromentWhite box crytography in an insecure enviroment
White box crytography in an insecure enviromentIqra khalil
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Is Exodus the best among the DOGE wallets_.pptx
Is Exodus the best among the DOGE wallets_.pptxIs Exodus the best among the DOGE wallets_.pptx
Is Exodus the best among the DOGE wallets_.pptxAgio Support Solutions
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)Maarten Mulders
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneArash Ramez
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 

Similar to Forensic Decrypt (20)

Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsx
 
13.pptx
13.pptx13.pptx
13.pptx
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)
 
How PUF Technology is Securing Io
How PUF Technology is Securing IoHow PUF Technology is Securing Io
How PUF Technology is Securing Io
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
White box crytography in an insecure enviroment
White box crytography in an insecure enviromentWhite box crytography in an insecure enviroment
White box crytography in an insecure enviroment
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Is Exodus the best among the DOGE wallets_.pptx
Is Exodus the best among the DOGE wallets_.pptxIs Exodus the best among the DOGE wallets_.pptx
Is Exodus the best among the DOGE wallets_.pptx
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
 
s117
s117s117
s117
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Forensic Decrypt

  • 1. ElcomSoft Provides Forensic Access to Encrypted BitLocker, PGP and TrueCrypt Containers Moscow, Russia – December 20, 2012 - ElcomSoft Co. Ltd. announces the release of Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. Supporting several acquisition modes, Elcomsoft Forensic Disk Decryptor offers complete access to encrypted information in real time. Recognizing desktop and portable crypto containers and offering zero-footprint operation, the new tool becomes an invaluable tool for investigators, IT security and forensic specialists. “Our customers asked us for a tool like this for a long, long time”, says Vladimir Katalov, ElcomSoft CEO. “We’re finally releasing a product that’s able to access encrypted volumes produced by all three popular crypto containers.” “Before Elcomsoft Forensic Disk Decryptor, only Elcomsoft Distributed Password Recovery could handle encrypted disks”, says Yuri Konenkov, ElcomSoft leading crypto analytic. “It used brute force to break passwords. Today, we’re introducing a special tool that uses a completely different approach to decrypting disks protected with PGP, True Crypt, BitLocker and BitLocker To Go. We have also added the ability to brute-force passwords for TrueCrypt and BitLocker To Go containers to Elcomsoft Distributed Password Recovery.” ElcomSoft also adds True Crypt and BitLocker To Go plugins to Elcomsoft Distributed Password Recovery, enabling the product to attack plain-text passwords protecting the encrypted containers with a range of advanced attacks including dictionary, mask and permutation attacks in addition to brute- force. About Elcomsoft Forensic Disk Decryptor Elcomsoft Forensic Disk Decryptor offers forensic specialists a fast, easy way of accessing information stored in three most popular crypto containers. Supporting desktop and portable versions of BitLocker, PGP and TrueCrypt, the new tool can either decrypt all files and folders stored in a crypto container or mount the encrypted volume as new drive letter for instant access. The complete decryption mode provides full, unrestricted forensic access to all information stored on encrypted volumes. Alternatively, by mounting encrypted containers as drive letters, investigators gain immediate, real-time access to protected volumes. In real-time mode, information read from encrypted containers is decrypted on-the-fly. Elcomsoft Forensic Disk Decryptor offers true zero-footprint operation with no alterations or modifications to original content ever.
  • 2. Elcomsoft Forensic Disk Decryptor acquires all necessary decryption keys by analyzing memory dumps or hibernation files obtained from the target PC. A memory dump can be obtained from a running PC, locked or unlocked, with encrypted volumes mounted. Memory dumps produced with any forensic product or obtained via a FireWire attack are supported. A FireWire attack requires a free third-party tool, a FireWire (IEEE 1394) cable and another PC to launch the attack from. Decryption keys can also be derived from hibernation files if a target PC is turned off. “For PGP Disk, one can greatly speed up the key search if the exact encryption algorithm is known”, comments Yury Konenkov, ElcomSoft's IT security analyst and developer. “Knowing the exact encryption method is not a given with PGP Disk. Elcomsoft Forensic Disk Decryptor will work either way, but if the algorithm is known, the program will locate the decryption key sooner.” In either case, the encrypted volumes must be mounted at the time of acquisition or before the computer was hibernated. If an encrypted volume is dismounted prior to acquisition, neither memory dumps nor hibernation files will contain proper decryption keys, and encrypted containers may not be decrypted without knowing the original plain-text password. If such a password is not known, it can be recovered with Elcomsoft Distributed Password Recovery. Compatibility Elcomsoft Forensic Disk Decryptor runs on all 32-bit and 64-bit editions of Windows XP, Vista, and Windows 7, as well as Windows 2003 and 2008 Server, and supports BitLocker, BitLocker To Go, PGP Whole Disk Encryption and TrueCrypt. Pricing and Availability Elcomsoft Forensic Disk Decryptor is available immediately. North American prices start from $299. Local pricing varies. About ElcomSoft Co. Ltd. Founded in 1990, ElcomSoft Co.Ltd. is a global industry-acknowledged expert in computer and mobile forensics providing tools, training, and consulting services to law enforcement, forensics, financial and intelligence agencies. ElcomSoft pioneered and patented numerous cryptography techniques, setting and exceeding expectations by consistently breaking the industry’s performance records. ElcomSoft is Microsoft Gold Independent Software Vendor, Intel Software Premier Elite Partner, member of Russian Cryptology Association (RCA) and Computer Security Institute. ### For more information about Elcomsoft Forensic Disk Decryptor visit http://www.elcomsoft.com/efdd.html