travianbo55

Elcomsoft Forensic Disk Decryptor v1.0.180 cracked version

May 23rd, 2014
307
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
ASP 3.97 KB | None | 0 0
  1.                                      Elcomsoft Forensic Disk Decryptor v1.0.180
  2.  
  3.  
  4.  
  5.  
  6.  
  7.  
  8.  
  9.             This is the full cracked version of the software. Download, extract, install, enjoy.
  10.    Inside the archive there is "crack" folder wich contains everything you need to crack the software.
  11.                                                 Download link:
  12.                                          https://safelinking.net/p/108ecd9ae3
  13.  
  14.  
  15.  
  16.  
  17.  
  18.  Forensic Access to Encrypted BitLocker, PGP and TrueCrypt Disks and Containers
  19.  
  20. Perform the complete forensic analysis of encrypted disks and volumes protected with desktop and portable versions of BitLocker, PGP and TrueCrypt. Elcomsoft Forensic Disk Decryptor allows decrypting data from encrypted containers or mounting encrypted volumes, providing full forensic access to protected information stored in the three most popular types of crypto containers. Access to encrypted information is provided in real-time.
  21. Features and Benefits
  22.  
  23.     Decrypts information stored in three most popular crypto containers
  24.     Mounts encrypted BitLocker, PGP and TrueCrypt volumes
  25.     Supports removable media encrypted with BitLocker To Go
  26.     Supports both encrypted containers and full disk encryption
  27.     Acquires protection keys from RAM dumps, hibernation files
  28.     Extracts all the keys from a memory dump at once if there is more than one crypto container in the system
  29.     Fast acquisition (limited only by disk read speeds)
  30.     Zero-footprint operation leaves no traces and requires no modifications to encrypted volume contents
  31.     Recovers and stores original encryption keys
  32.     Supports all 32-bit and 64-bit versions of Windows
  33.  
  34. Access Information Stored in Popular Crypto Containers
  35.  
  36. ElcomSoft offers investigators a fast, easy way to access encrypted information stored in crypto containers created by BitLocker, PGP and TrueCrypt.
  37. Two Access Modes*
  38.  
  39. Access is provided by either decrypting the entire content of an encrypted volume or by mounting the volume as a drive letter in unlocked, unencrypted mode.
  40. Complete Decryption
  41.  
  42. In complete decryption mode, Elcomsoft Forensic Disk Decryptor will automatically decrypt the entire content of the encrypted container, providing investigators with full, unrestricted access to absolutely all information stored on encrypted volumes.
  43. Real-Time Access to Encrypted Information
  44.  
  45. In real-time mode, Elcomsoft Forensic Disk Decryptor mounts the encrypted volume as a new drive letter on the investigator’s PC. In this mode, forensic specialists enjoy fast, real-time access to protected information. Information read from mounted disks and volumes is decrypted on-the-fly in real time.
  46.  
  47. * Another program Elcomsoft Distributed Password Recovery allows attacking plain-text passwords protecting the encrypted containers with a range of advanced attacks including dictionary, mask and permutation attacks in addition to brute-force.
  48. Zero Footprint Operation
  49.  
  50. ElcomSoft offers a forensically sound solution. The tool provides true zero-footprint operation, leaving no traces and making no changes to the contents of encrypted volumes.
  51. Three Ways to Acquire Encryption Keys
  52.  
  53. Elcomsoft Forensic Disk Decryptor needs the original encryption keys in order to access protected information stored in crypto containers. The encryption keys can be derived from hibernation files or memory dump files acquired while the encrypted volume was mounted. There are three ways available to acquire the original encryption keys:
  54.  
  55.     By analyzing the hibernation file (if the PC being analyzed is turned off);
  56.     By analyzing a memory dump file *
  57.     By performing a FireWire attack ** (PC being analyzed must be running with encrypted volumes mounted).
  58.  
  59. * A memory dump of a running PC can be acquired with one of the readily available forensic tools such as MoonSols Windows Memory Toolkit
  60. ** A free tool launched on investigator’s PC is required to perform the FireWire attack (e.g. Inception)
Add Comment
Please, Sign In to add comment