Quantcast
Channel: Forensic Focus Forums - Recent Topics
Viewing all articles
Browse latest Browse all 20106

General Discussion: Password Recovery Software

$
0
0
fraudit wrote: I've used both Passware and Elcomsoft password recovery suites and I've found Passware product quicker and more effective. An important thing is that I used both of them almost exclusively for recovering archive and office docs passwords, not other applications and/or system.Hmmm, unless you did some specific tests, I wonder how you gathered this impression. <img src="images/smiles/icon_eek.gif" alt="Shocked" title="Shocked" /> I mean <img src="images/smiles/icon_smile.gif" alt="Smile" title="Smile" /> , you have file xy.doc (or .zip or .docx or .xls or .xlsx). You make a try at it's password with tool "a" using (say) a dictionary. Tool "a" either manages to get the password or it does not. If it does, I doubt that you will be going on the same file with tool "b". (you already got the password) If it does not, you try (with the same dictionary) the same xy file with tool "b". Tool "b" either manages to get the password or it does not. If it does, tool "a" sucks big and tool "b" works fine. If it does not either both tools suck big or your dictionary sucks big (or the password is a good, non dictionary word). Same applies for bruteforcing. You make a try at file xy with tool "a" using bruteforce. Tool "a" either manages to get the password or it does not. If it does, I doubt that you will be going on the same file with tool "b".(you already got the password) If it does not, you try (with the same bruteforce pattern if any) the same xy file with tool "b" Tool "b" either manages to get the password or it does not. If it does, tool "a" sucks big and tool "b" works fine. If it does not either both tools suck big or your pattern (if any) sucks big . Can you detail your experience? jaclaz

Viewing all articles
Browse latest Browse all 20106

Trending Articles