About Desktop Forensic Bundle
Password Recovery Basics
Types of Password Protection
Recovering Strong Passwords
Brute-force Attack
Mask Attack
Dictionary Attack
Dictionary Mutations
Hybrid Attack with Rules
Password Recovery Programs
Advanced Archive Password Recovery
Introduction
Requirements
How to work with the program
Passwords and encryption
Selecting the options
Opening the archive
Type of attack
Brute-force range options
Start from password
Password mask
Password length
Dictionary options
Known plaintext attack (ZIP)
Known plaintext attack (ARJ)
Guaranteed WinZip attack
Password from keys
Auto-save
Other options
Advanced options
Save and Read setup
Save and Read setup
Benchmarks
Benchmark
Getting the results
Recovery process
Program status
Results
Known bugs and limitations
Known bugs and limitations
Tips & tricks
Files with different passwords
What to start from
Command line
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of the trial version
Acknowledgements
Acknowledgements
Advanced Intuit Password Recovery
Introduction
Program information
System requirements
Working with AINPR
Quicken passwords
QuickBooks passwords
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of unregistered version
Advanced Lotus Password Recovery
Introduction
System requirements
Working with ALPR
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of unregistered version
Advanced Mailbox Password Recovery
Introduction
System requirements
Working with AMBPR
User interface
Recovery
Search for email clients
Automatic password recovery
Manual password recovery
Mail server emulator (auto mode)
Mail server emulator (manual mode)
Options
Exit
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of unregistered version
Advanced Office Password Breaker
Introduction
Requirements
About Word and Excel encryption
Supported and unsupported formats
Working with AOPB
Foreword
Searching for encryption key
Decrypting the document
Options
Rainbow attack
Command line interface
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Limitations of unregistered version
Registration
Advanced Office Password Recovery
Introduction
End-user license agreement
Getting Started with AOPR
System requirements
Supported file types and passwords
Supported hardware
Getting Help and Technical Support
Contacting us
Where to get the latest lersion
Working with AOPR
Recovering Document Passwords
Selecting a file
Analyzing the results
Working with Projects
Creating a project
Saving a project
Outlook E-Mail Accounts
Recovering E-Mail account passwords
Outlook Password Storage Types
Microsoft Passport stored passwords
VBA Backdoor
Setting AOPR Options
Type of Attack
Preliminary Attack
Customizing the Preliminary Attack
General Options
Other options
Password Cache
About Password Cache
Managing Password Cache Files
Passwords Manual
Strong Passwords
Word/Excel Password to Open (Office 97/2000)
Word/Excel/PowerPoint Password to Open (Office XP/2003)
Microsoft OneNote Password to Open
Microsoft Money 2002+ Password to Open
Office 2007 and later: password to open
Weak Passwords
Word/Excel Password to Open (Weak Encryption)
Visual Basic for Applications (VBA)
Microsoft Access
Access Share-Level (Database) Password, Owner Information
Access User-Level Passwords
Microsoft Excel
Excel Document - all Passwords except Password to Open
Excel Add-In (XLA) Protection
Pocket Excel
Microsoft Word
Word Document - all Passwords except Password to Open
Microsoft Outlook
Outlook Personal Storage File Password
Outlook E-Mail Accounts Passwords
Microsoft PowerPoint
Microsoft Money
Microsoft Project
Troubleshooting
Creating the Debug Log
Trial Version of AOPR and Registration
Limitations of the Trial Version
Registration
Advanced PDF Password Recovery
Introduction
Requirements and limitations
Using the program
About PDF encryption
Selecting the attack
Encrypted PDF file
Type of attack
Brute-force range options
Start from password
Password mask
Password length
Dictionary options
Key search
Auto-save
Other options
Advanced options
Save and Read setup
Save and Read setup
Benchmarks
Benchmark
Getting the results
Recovering process
Program status
Results
Tips & tricks
Where to begin
Command line
Error messages
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of unregistered version
Advanced Sage Password Recovery
Introduction
Program information
System requirements
ACT! password recovery
PeachTree/Accounting password recovery
Other Sage products
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Trial version limitations
Advanced SQL Password Recovery
Introduction
Program information
System requirements
Working with ASQLPR
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Trial version limitations
Advanced WordPerfect Office Password Recovery
Introduction
System requirements
Working with AWOPR
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Trial version limitations
Elcomsoft Internet Password Breaker
Introduction
Program information
System requirements
Outlook PST password
Internet Explorer passwords
Other browsers
Mail and news passwords
Password storage types
Options
Report and Password list
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Trial version limitations
Elcomsoft Wireless Security Auditor
Introduction
Program information
System requirements
About wireless security
Working with EWSA
Capturing network packets
Installing the NDIS driver
Attack settings
Dictionary mutations
Hardware acceleration
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Trial version limitations
System and Data Recovery Programs
Advanced EFS Data Recovery
Introduction
Working with AEFSDR
About EFS (Encrypting File System)
How Advanced EFS Data Recovery works
The Wizard mode
Scan for encryption keys
Scan for encrypted files
Browse for encrypted files
Decrypting files
Program options
System requirements
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of unregistered version
Elcomsoft Forensic Disk Decryptor
Introduction
Program information
System requirements
Working with the program
Extract keys
Decrypt or mount disk
TrueCrypt and VeraCrypt
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Legal notices
Elcomsoft Password Digger
Introduction
Program information
System requirements
Working with the program
Obtaining keychain files
Options
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Legal notices
Elcomsoft System Recovery
Introduction
End-user license agreement
Contacting us
Program information
Important compatibility notes
Creating bootable media
How to use the program
Booting from a CD or USB device
Mass-stogare drivers
Database source and working mode
Select operating system or SAM/AD files location
Local user accounts
AD accounts
Domain cached accounts
SAM database editor
Disk tools
Unlock BitLocker drives
Passwords and credentials
Miscellaneous
Proactive Password Auditor
Introduction
Requirements
How to work with the program
About Windows passwords
How the program works
Obtaining password hashes
Credentials
Password cracking
Password cracking methods
Dictionary attack
Brute-force attack
Rainbow attack
Recovery process and results
Reports
Program options
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Limitations of unregistered version
Proactive System Password Recovery
Introduction
System requirements
Working with PSPR
User interface
Main menu
Logon password
Cached passwords
RAS entries
Shared info
Recovered hashes
Screensaver password
Domain cached credentials
Advanced features
Groups and users
NT secrets
Run as
Windows CD key
Net passwords
Unmasking hidden passwords and re-enabling disabled controls
Unhiding passwords masked with asterisks
Control reviver
Registry and AD
Password reset disk
Mail/FTP server emulator
Misc features
Protected storage
Remote assistance
Script decoder
Remote desktop
Wireless network
Recover PWL
View PWL file
Bruteforce attack
Dictionary attack
Options
General options
Attacks options
NT hash options
Technical support
Contacting us
Where to get the latest version
License and registration
End-user license agreement
Registration
Trial version limitations
End-user license agreement
Technical support