Forensic tool cracks Windows Hello PIN codes

Forensic tool cracks Windows Hello PIN codes

Share post

ElcomSoft cracks Windows Hello PIN codes with its forensics tool and attacks the LUKS2 encryption. This extends the range of forensic password recovery tools to include support for Windows Hello PIN codes on TPM-less computers. There is also support for the new LUKS2 specification for encrypted disks and containers in Linux.

Microsoft implements PIN codes as part of Windows Hello authentication and recommends using PIN codes instead of a password. By default, PIN codes contain only digits, but alphanumeric PINs are also possible. While 4 to 6 digit PINs can be cracked in minutes, attacking an alphanumeric PIN is significantly slower compared to recovering Windows NTLM passwords.

Windows Hello PIN code cracking

Elcomsoft Distributed Password Recovery (EDPR) version 4.45 offers the possibility to attack Windows Hello PIN codes on systems without a Trusted Platform Module (TPM). For digit-only PIN codes, recovery is almost instantaneous and can be performed while booting from a USB drive running the recently updated Elcomsoft System Recovery 8.30.

Elcomsoft System Recovery 8.30

The updated Elcomsoft System Recovery helps users and forensic experts to extract LUKS2 encryption metadata from all connected storage devices by booting the computer under investigation from a USB flash drive in a portable Windows PE environment. The tool works in the familiar Windows environment and helps experts quickly get the data needed to attack LUKS encrypted hard drives.

Elcomsoft Forensic Disk Decryptor 2.20

Elcomsoft Forensic Disk Decryptor (EFDD) is a Windows tool for instantly extracting encryption metadata from a variety of encrypted hard drives and forensic disk images. Unlike Elcomsoft System Recovery, Elcomsoft Forensic Disk Decryptor runs on the expert's computer and does not require booting into the Windows PE environment.

The tool helps in accessing encrypted disk containers. This can be achieved by extracting password hashes for further brute force attacks, and by analyzing memory when looking for encryption keys. Containers can be decrypted or mounted to gather evidence.

Elcomsoft Distributed Password Recovery 4.45

Elcomsoft Distributed Password Recovery can attack LUKS2 encryption passwords in the new version. The program is a high-end password recovery solution that is scalable to 10.000+ workstations and offers the fastest recovery using the most advanced commercially available technologies.

The product enables accelerated password recovery for more than 500 formats, including Microsoft Office and Adobe PDF documents, encrypted volumes and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX logins - and domain passwords, BitLocker, LUKS, TrueCrypt and VeraCrypt disk encryption.

More at Elcomsoft.de

 

 


About ElcomSoft

The software development company ElcomSoft Co. Ltd. was founded in 1990 by Alexander Katalov and has been in his possession ever since. The Moscow-based company specializes in proactive password security software for businesses and private users and sells its products worldwide. ElcomSoft aims to provide users with easy-to-use password recovery solutions to access their data. The software company also provides administrators with security solutions with which they can locate and eliminate unsafe identifiers in company networks under Windows or rescue EFS-encrypted files.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more