Elcomsoft Tool Evaluation Blog 3

More Evaluations & Final Report!

Recently we’ve focused on evaluating more Elcomsoft applications as well as putting together our final report. We continued to use the same scoring criteria from our previous blog to test these tools. The applications we tested include Advanced PDF Password Recovery, Proactive System Password Recovery, Advanced Archive Password Recovery, Elcomsoft System Recovery, Elcomsoft Cloud eXplorer, Elcomsoft Internet Password Breaker, and Distributed Password Recovery.

Advanced PDF Password Recovery:

Advanced PDF Password Recovery is another helpful program by Elcomsoft and can decrypt any password protected PDF files. This program is nearly identical to Advanced Archive Password Recovery in the way it looks and operates. The only notable difference about the two tools is that Advanced PDF Password Recovery has a few more attack options. These are: brute force, mask, dictionary, plain-text, winzip recovery, and password from keys. Similar to Advanced Archive Password Recovery, the user will have to read through the available manual to understand all the functions and attacks.

(interface of Advanced PDF Password Recovery)

Once the user has input the encrypted PDF into the program, it will get to work. Depending on the type of attack and the set specifications, it can take a fair amount of time to finish. The program will get the password and decrypt the document as long as the password fits within the set parameters.
 
We have tested this program with multiple passwords ranging in length character types, and we have come to a conclusion about the program. We give this tool a score of 5. The program is completely functional and will get the task done; however, in order to be certain of which attack to use, as well as the capabilities of the program, the user will want to reference the help manual and a few online tutorials to fully understand the tool. Because this application is almost identical to Advanced Archive Password Recovery, it seems appropriate they should receive the same score. They are both well-made tools, but could use improvement in the same areas.

Proactive System Password Recovery:

Using the same scale, we would rate Proactive System Password Recovery a 3. This tool is simple to use and its tasks can be performed with the touch of a button. There are five different sections of information to find and use on the program. The sections include main menu, advanced features, revelation, misc, and Recover PWL. Each section has a unique purpose and finds different information.

We accessed this information easily. The tool does everything on its own since it just takes the information from the system. With administrator access, the use can do more  with the tool. They can decrypt some of the information found from the system like hashes, passwords, and more. The information will all save to a file to reference later which shows all the information captured from each tool.

Advanced Archive Password Recovery:

Advanced Archive Password Recovery is a useful program that can obtain the password of encrypted ZIP and RAR files. After spending some time evaluating, we’ve become familiar with the ins and outs of this tool. The interface of the program reminded us of the Advanced Office Password Recovery program, also distributed by Elcomsoft, but with fewer options for types of attacks. These attack choices include brute force, dictionary, mask, and key search. Since each of these attacks usually takes a significant amount of time, the user will have options to narrow down the specifications a bit in ways such as password length, range options (i.e. lower-case, upper-case, numbers, symbols, etc.), and dictionary types.

(interface of Advanced Archive Password Recovery)

To break the encryption, the user will need to choose the specific ZIP or RAR file and then specify how the attack should approach the file. Once the process has started, the tool will notify the user how long it will take until all the password possibilities have been exhausted. 

After testing this program with multiple password protected files, we have decided to give the program a 5. The tool will definitely retrieve the password as long as the user inputs the correct specifications and uses it on either a ZIP or RAR files. The program interface and tool options are clustered and someone with no experience in the field would most likely not know how to run the program. They would need to browse the manual to understand the process and it would take a significant amount of time studying the program to understand all the available features in the tool. Overall, however, the tool works well and isn’t too complex to the point where it is not usable with a bit of extra spare time to understand it.

Elcomsoft System Recovery:

Following the same evaluation process, we would rate Elcomsoft System Recovery a 5. This tool requires some work that will take experience. However, the interface is easy to read and understand. In order to download the system files, the user has to create a partition of a drive for a USB to download the files to. After, the user can open the tool, navigate throughout the wizard, and create the ESR bootable disk on the USB. The tool will download a copy image of the files.

Once everything is copied onto the USB, it’s safe to remove and power down the computer completely. The USB needs to be plugged back into the computer which then needs to be powered on again. The user needs to quickly gain access to the BIOS screen which will pop-up the Elcomsoft version of the BIOS screen from the USB. From there, the user will have multiple options of what to do with the system files. Under the CMD.EXE, they can change the local user account, dump password hashes, dump domain cached credentials, backup SAM (where you can change computer passwords to get access to computer systems as though they are yours), and restore SAM (in case something goes wrong) and SAM editor.

Elcomsoft Cloud eXplorer:

After testing Elcomsoft Cloud eXplorer, we believe this program is everything anyone could ask for in a tool like this. Upon opening, the user will be greeted with a clean looking program with hardly any options and zero clutter. The user’s only options (besides changing the settings and checking the help manual) are to add a Google snapshot or to download a Google Drive file. Upon selecting either of these choices, the user will be asked to enter the Google account information or a Google Token to gain access to the info. If that’s successful, the program will allow them to choose what they want to download from the account, including the drive, computer, and deleted and shared files.

(interface of Elcomsoft Cloud eXplorer)

The important thing to note about this program is that its job is not to figure out the password to the Google Account. It assumes the user has the password already and simply wants to download the files from the account.

After all of that is done and the download location has been selected, all the files can be viewed. Everything is presented in an organized file format so the user can find exactly what they are looking for. We’ve used this program for multiple Google accounts and it completes the task at a relatively fast pace every time. Seeing as the program is extremely simple and how well it functions, we give this tool a score of 1. We feel most anyone would be able to use it on their first attempt without any assistance and that there isn’t a better program out there to download Google Drive files and Google Snapshots. This is one of Elcomsoft’s best products we’ve tested so far and is worthy of earning a coveted score of 1.

Elcomsoft Internet Password Breaker:

Using the above scale, we would rate Elcomsoft Internet Password Breaker a 3. This tool does everything really simply. The user can open a PST file, Web Browsers or Mail. The web Browsers work for Internet Explorer, Microsoft Edge, Google Chrome, Apple Safari, Mozilla Firefox, Opera, and Yandex Browser. For mail accounts, the tool uses OE News Accounts, OE Mail Accounts, OE Identities, Outlook accounts, Thunderbird, W[L]M Mail Accounts and W[L]M News Accounts.

We accessed this information by using different account information on Microsoft Edge and Google Chrome. While using one of the accounts, we found that one can lead to more than one username and password. It is possible that any username or passwords saved to an account in Google can access any saved passwords . The passwords are easy to extract. We pressed ‘Web Passwords’ and choose which web browser we used and got all the information for the accounts, as long as the passwords were saved to the browser.

It is easy to access individual passwords and export the passwords into a file with a click of a button as well. Recovery of usernames and passwords are easy if the tool has access from the web browser. It is most useful when downloaded onto a computer to access or recover passwords. This tool is user-friendly and effective with some prior knowledge of its purpose and capabilities.

Distributed Password Recovery:

Distributed Password Recovery is a very unique password cracking tool in that it supports many different types of file formats instead of just a single program. Due to its elaborate looking setup, the user might be intimidated by the program. There are many options available including tasks, agents, connection, messages, and dictionaries. Most of these tabs won’t be necessary in the password restoration process. If the user wishes to learn all of the functions, they can refer to a manual installed on the program.

(interface of Distributed Password Recovery)

To start the process, the user will import the file they want cracked and have a list of attacks they may want to use: dictionary, mask, or brute force. Once they’ve chosen an attack, the process begins, and it will inform the user how long the tests will take. Then it will let the user know whether it was able to recover the password or not. This is where we faced an issue with the program. From what we can see, there is no way to view the recovered password. We have read through the manual, watched tutorials, read online materials; however, despite all of our best efforts, we can’t figure out how to access the cracked document.

We couldn’t get the program to function properly and many of its unnecessary features require reading through the manual. As a result, we are giving this tool a score of 13. On the surface, it may not look too bad, but we haven’t found any other program from Elcomsoft as complex and difficult as this one. We will continue to try to figure out more about how to use this program. At this point, however, we’ll stick with this score, given the password seems unattainable.

Conclusion

Elcomsoft has produced an array of quality tools that all impress us as we continue to individually test them. They all prove to be useful in some capacity and luckily none of them are too complex. With a little bit of reading and research, we have been able to figure out just about every component. In the upcoming weeks, we will see if there are any other tools we think would be crucial to evaluate. We will also focus on getting our final report to near completion.

Be sure to check us out on Twitter @ChampForensics, Instagram @ChampForensics, and Facebook @ChamplainLCDI to see other important information pertaining to our project!

 

More Research Projects
The Internet of Things Team: An Inside Look
CyberTech: Creating a Safer Internet Through Education
Capstone Chronicles: The Networking Natural