Archive for the ‘Cryptography’ Category

TROOPERS09 – are you with hackers or what?

Wednesday, April 22nd, 2009

If you added this blog to your news feeder, then you prefer getting skilled rather than getting owned – as in Troopers’ motto.

Troopers09 is an international IT-Security Conference held in Munich, Germany. This event is created for CISOs, ISOs, IT-Auditors, IT-Sec-Admins, IT-Sec Consultants and everyone who is involved with IT-Security on a professional basis. The goal is to share in-depth knowledge about the aspects of attacking and defending information technology infrastructure and applications. The featured presentations and demonstrations represent the latest discoveries and developments of the global hacking scene and will provide the audience with valuable practical know-how.

Andrey Belenko ( ElcomSoft’s Lead IT Security Analyst) will enjoy the conference and give a talk tomorrow (on 23rd April 2009) at 16:00 – 16:45, here is an abstract of his speech: http://troopers09.org/content/e3/e282/index_eng.html 

 

NEW: Rainbow Tables for password-protected Excel spreadsheets

Thursday, April 16th, 2009

And now…. we have Rainbow Tables for Microsoft Excel docs with 40-bit encryption. So, it became possible to reach near-instant recovery of 97% of spreadsheets created in MS Excel 97-2003. Unfortunately, due to specificity of Excel spreadsheets format it’s unreal to get 100%-recovery, still, you can use brute force to cover the rest 3%.  

Loading….

Attacking…

Result!

Lotus Notes ID files password cracking

Friday, April 10th, 2009

You’re probably aware that our Distributed Password Recovery works with Lotus Notes ID files (as well as with two dozen other file formats, of course). Some sad news: in latest versions of Notes (8.5), encryption has been improved. In older versions, only 64-bit and 128-bit RC2 options were available, but now you can also use AES (128-bit or 256-bit). Well, encryption itself does not actually matter, but the problem is that password verification routine is not much better (worse?) as well: 5,000/10,000 SHA-1 cycles have been added. EDPR will be updated accordingly to support new format (you can subscribe to our mailing list to be notified), of course, but don’t expect the high recovery speed: we can get several hundred passwords per second only. For older versions of Notes, the speed was ~100,000 passwords per second or higher.

WPA Benchmark

Monday, April 6th, 2009

Here are the benchmarks for WPA recovery; we’ve run tests on one of the most powerful modern CPUs and a bunch of GPUs. Even GTX 280 outperformed Core 2 Quad Q6600:

wpa_benchmark2

Password Recovery Tambourine

Wednesday, April 1st, 2009

Today morning ElcomSoft announced a new tool for password recovery. This one is a hardware, a supernatural amulet of Siberian shamans. Password Recovery Tambourine appears in 4 editions: Pentagon, Glamourous, Russian and Open Source. This hardware requires a special 15-month training with authentic Yakutsk shaman guild. However, if you are patient enough to spend a year and a half in Siberia and not afraid of permanent frost there, then after the training no password would be strong enough for you. You’ll crack it in seconds with your preferable edition of Password Recovery Tambourine. Cultural note The idea of creating Password Recovery Tambourine grew out of the popular belief between Russian system administrators that when nothing else helps you have to rest your hopes on dancing with a ‘BU-BEN (Russian for ‘tambourine’). They say, dancing with a tambourine helps to reanimate one’s server, find bugs, set up operational system and what not. Implementation of this belief to password recovery was not easy, at least 200 ritual dances have been performed during the development stage. Finally,

ElcomSoft is proud to announce that the ultimate tool to recover lost passwords that cannot be recovered it in a traditional way has emerged.

Shaman

EFS-Encrypted Data Recovery

Tuesday, March 31st, 2009

The Encrypting File System (EFS) was first introduced in Windows 2000 and, as Microsoft claims, is an excellent encryption system with no back door.

However, the most secure encryption can be ambiguous. It would efficiently prevent hackers and other illegal intruders from breaking into your system and getting access to your well-encrypted data. The other side of the coin is that both a regular user and a seasoned administrator can lose important data due to unforeseen circumstances. It is also the case with EFS.

Check out the success story on how EFS-encrypted data can be recovered (the PDF is 81 Kbyte) with Advanced EFS Data Recovery.

Pen Testing with Distributed Password Recovery and GPUs

Thursday, March 19th, 2009

The German c’t magazine (issue 06/09) has published an article about cracking of NTLM-hashes with graphic cards. In this article pen test experts from SySS GmbH bring up a touchy question of how fast an intruder can break into your system. How long should your Windows logon password be, so that you could keep having your beauty sleep?

Elcomsoft Distributed Password Recovery was run on dual-core AMD Athlon X2 4850e, 2.5 GHz, with Nvidia GeForce 9800 GTX installed. The cost of the test system is worth the effort. One can fetch it for only $1K.

Now, what is the outcome?
(more…)