The new feature allows administrators to easily manage and allocate the available computational resources across jobs. The administrative server enables users to tap into a pool of available resources by requesting a certain number of recovery agents for a given job. The reserved recovery agents will be allocated to that one job, allowing multiple password recovery tasks to run at the same time.
Resource management simplifies the process of distributing and utilizing the available computational resources across multiple password recovery jobs, ultimately leading to improved efficiency and scalability.
GPU acceleration is now supported on the newest generation of NVIDIA boards, the Ada Lovelace-based RTX 40 and RTX 40 Super series graphics cards. Using these boards, experts can achieve unprecedented recovery speeds while enjoying higher efficiency compared to previous-generation NVIDIA graphics cards.
Break complex passwords, recover strong encryption keys and unlock documents in a production environment. Elcomsoft Distributed Password Recovery is a high-end solution for forensic and government agencies, data recovery and password recovery services and corporate users with multiple networked workstations connected over a LAN or the Internet. Featuring unique acceleration technologies and providing linear scalability with no overhead, Elcomsoft Distributed Password Recovery offers the fastest password recovery by a huge margin, and is the most technologically advanced password recovery product currently available.
Elcomsoft Distributed Password Recovery employs a revolutionary, patented technology to accelerate password recovery when a compatible NVIDIA or AMD graphics card is present in addition to the CPU-only mode. Hardware acceleration utilizes GPU cores of NVIDIA GeForce boards, AMD GPUs, as well as GPU cores built into Intel CPUs including Intel HD Graphics, UHD Graphics and Intel Iris.
The acceleration technology offloads parts of computational-heavy processing onto the fast and highly scalable processors featured in the latest graphic accelerators, achieving unprecedented recovery speeds exceeding those available to CPU-only users by significant margin.
ElcomSoft pioneered asynchronous hardware acceleration. Heterogeneous acceleration allows using multiple video cards of different makes and models, effectively utilizing existing hardware and squeezing the last bit of performance out of every supported component.
Multiple Windows, Linux and macOS full-disk encryption tools are supported including TrueCrypt/VeraCrypt, all versions of Microsoft BitLocker, PGP WDE, FileVault2, BestCrypt and LUKS. The tool must be launched with administrative privileges on the live system being analyzed. If an encrypted volume is detected, a further investigation of a live system might be needed to preserve evidence that could be lost if the computer were powered off.
By only transferring the bare minimum of information over the network, Elcomsoft Distributed Password Recovery allows for massively parallel operation, and scales linearly to as many as 10,000 workstations with no scalability overhead.
The use of virtual machines is on the rise, enabling criminals cover their activities under a virtual umbrella. While storing massive amounts of evidence, an encrypted virtual machine can greatly reduce the risks of an accidental leak of incriminating evidence. Elcomsoft Distributed Password Recovery helps investigators gain access to all of that evidence by breaking the original encryption password.
Three of the most popular virtual machines are supported: VMware, Parallels, and VirtualBox. The tool can attack and recover the original VM encryption passwords, helping investigators to gain access stored in encrypted images.
Elcomsoft Distributed Password Recovery utilizes dedicated high-performance cores found in today's video cards such as those manufactured by NVIDIA and AMD to offload parts of computational-intensive calculations onto the highly scalable video cards. Featuring several hundred GPU cores, a single video card can deliver the speed far exceeding the metrics of a high-end CPU. Elcomsoft Distributed Password Recovery uses thoroughly optimized algorithms, reaching recovery rates that are up to 250 times faster compared to CPU-only benchmarks.
Today's PC motherboards support multiple video cards. Thanks to ElcomSoft's proprietary heterogeneous computing, Elcomsoft Distributed Password Recovery supports a mix of up to 32 video cards even if they are of different makes and models, allowing for even faster password recovery applications for a modest increase in hardware costs. The tool allows mixing NVIDIA and AMD boards of different generations in a single PC.
Elcomsoft Distributed Password Recovery is licensed based on the number of instances (agents). We accept all major credit cards, checks, bank transfers and purchase orders. Sales taxes may be added to your order according to your jurisdiction. Credit card orders are processed immediately. Electronic licenses are generally available instantly after the credit card charge is approved. On rare occasions where we must manually verify your order, the license will be available in 48 hours or less.
The resource management capability is a game-changer for busy environments. The feature allows administrators to easily manage and distribute the available computational resources across multiple jobs. The administrative server enables users to tap into a pool of available resources by requesting a certain number of recovery agents for a given password recovery job. The reserved recovery agents will be allocated to that one job, allowing multiple tasks to run separately at the same time.
In essence, resource management simplifies the process of managing and utilizing the available computational resources by several jobs, ultimately leading to improved efficiency and scalability. Here's how it works:
The included Elcomsoft Hash Extractor tool allows extracting encryption metadata from a wide range of file formats. By using encryption metadata to set up attacks, you are automatically excluding the possibility of potentially sensitive information such as raw or encrypted data falling into the wrong hands as none is included in the extracted hash files.
Elcomsoft Hash Extractor enables to set up attacks on a tiny hash file instead of the original, potentially large file or document. Since no raw or encrypted data is included in encryption metadata, the hash files produced with Elcomsoft Hash Extractor offer significantly higher level of privacy, allowing remote and cloud processing without the risk of a content leak.
Elcomsoft Hash Extractor supports all major Microsoft Office, Open Document, Apple iWork, and Adobe Acrobat formats, as well as LastPass and 1Password password managers and LM/NTLM/DCC hashes. The full list of supported formats is available below.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords and much more.
Uninstallation procedure: in order to uninstall the product, follow the standard procedure via Control Panel - Programs and features or use the corresponding Unistall link from the product's folder in the Windows Start menu.
Every tool we make in a deeply discounted value pack. The complete suite of ElcomSoft password recovery tools allows corporate and government customers to extract data from mobile devices, unlock documents, decrypt archives, break into encrypted containers, view and analyze evidence. The password recovery suite features the latest and most advanced cryptanalysis algorithms developed by ElcomSoft Research department, while the mobile forensic tools enable access to critical evidence stored in physical devices, local backups and cloud services.
Learn More
A complete suite of ElcomSoft password recovery tools allows corporate and government customers to unprotect disks and systems and decrypt files and documents protected with popular applications. The password recovery suite features the latest and most advanced cryptanalysis algorithms developed by ElcomSoft Research department.
Learn More
The complete mobile forensic kit enables law enforcement, corporate and government customers to perform physical, logical and over-the-air acquisition of smartphones and tablets, break mobile backup passwords and decrypt encrypted backups, view and analyze information stored in mobile devices. Bundle consists of all currently available mobile forensic tools offering the best value on the market.
Learn More
Build high-performance clusters for breaking passwords faster. Elcomsoft Distributed Password Recovery offers zero-overhead scalability and supports GPU acceleration for faster recovery. Serving forensic experts and government agencies, data recovery services and corporations, Elcomsoft Distributed Password Recovery is here to break the most complex passwords and strong encryption keys within realistic timeframes.
Learn More
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Learn More