Profile

Cover photo
PasswordRecoveryTools.com
127 followers|49,420 views
AboutPostsPhotosVideos

Stream

 
#CrackPassword on GPU Pascal GP104 (NVIDIA GeForce 1070/1080) at top performance.
 
We have released Passcovery Suite 3.3. The program is now faster, more versatile and reliable than ever.

Changes in Passcovery Suite 3.3:

- Support for SM 6.1 and new GPU Pascal GP104 – works on NVIDIA GeForce 1070/1080
- Support for updated NVIDIA drivers gives performance boost up to 15%
- Simplified offset setup while cracking TrueCrypt passwords
- Fixed a bug in the dictionary attack with “words” between 256 and 1024 symbols
- Fixed known bugs occurred while working with non-standard Microsoft Office 95-2003 documents

Try the revamped performance and comfort of the new Passcovery Suite. A free demo version is available at the Passcovery website.
View original post
1
Add a comment...
 
Hacking Excel 2016 password. So long, and thanks for all the fish

Goddamn Reddit has removed my comment to some student’s request (https://goo.gl/OYHxnn). Supposedly because of a link to our mega-cool password cracking software. Miserable fools! :)

The story is some fellow under the problemboy99 nick asks how to crack a password to Excel 2016. If he manages to crack it, he gets ‘passed’ for the exam or something like that. Easy money!

And then all those commenters start producing crap like ‘write a VBA macros’ or ‘open the file in OpenOffice’ and other bullshit…

Hey, people! Didn’t you read or what – the file is password protected! This is just a mean joke of the teacher, nothing more. The fellow will get his ‘passed’ in about couple of thousands years. That’s funny.

The reason is you can’t crack Excel 2016 password if you don’t have any knowledge about its structure. There are no tricks here, like guaranteed decryption of Excel 97-2003 documents (https://accessback.com). Excel 2007-2016 are different in that. The only option left is exhaustive search. And since we know nothing about password structure, we have to try all of them. Like in ‘every single f**ing password variant’. Which means, a pitiful 7-characters password will be bruteforced in about several thousands years:

Too slow? Yup. And it won’t be much faster. Trust me: our software is extra optimized in terms of performance. Yes, you can scale it up by adding more faster GPU, but that is a much more expensive way. Not a twenty bucks way, at least. :)

The rating of GPU if you are interested - https://passcovery.com/password-recovery-software/gpu-performance.htm

So, how can one #breakpassword for #Excel2016?..

This is possible only with due preparation and at least approximate knowledge or guess about what we seek. You better know something about the password structure, but the bare minimum is at least some speculations to start attacking the password.

While direct exhaustive search is ineffective, we have only two options left:

- Dictionary attack with mutations. Assuming the password is a word, a group of words or modified words (password -> p@$$w0rd), our software can attack the password using mutations in the specified dictionaries. Here is a video example - https://youtu.be/GIYLN1Uy8_M

- Extended mask attack. If you know at least something about the password structure you can try to compose a complex mask. In our software you can specify even such exotic rules as: the first symbol in the password is a capital letter, the second is a number only, then we’ve got a line of letters, and in the end – a number and a special character (P4hdJfy9!). That is a real-world example, by the way - https://passcovery.com/helpdesk/knowledgebase.php?article=53

Anyway, the fellow is hardly going to get his ‘free’ exam, but he never knows about it, because goddamn Reddit removed my comment. ;)

PS: Oh, of course, there’s always a possibility, that the password was set by a clueless idiot who managed to come to a ‘brilliant’ password 12345
1
1
Add a comment...
 
 
We received a feedback from Germany (see below). I'd like to mention the most evident things:

1. files are removed from the server
2. nobody reads information contained in files

In case of payment for decryption, files are removed in a day after sending them to the user and files that are abandoned (unpaid) are removed in 7 days.

"Thank you from the bottom of my heart, indeed. File arrived, and after 12 years it is most interesting to read again. The only document I ever had password-protected...

It is, by the way, my fearless, searching moral inventory as suggested by Step 4 in AA. I trust that you have your copy deleted by now. If not - well, no harm is done if anybody reads it after all this time. It could even be something my Higher Power has arranged, there may be reasons.

Your service is most helpful and I will surely recommend it.
W. Welzin
Best regards from Hamburg/Germany"

You can find more feedbacks and guaranteed decryption of password-protected documents created in
Excel/Word 97-2003 on AccessBack.com 
Passcovery’s unique rainbow tables guarantee 100% success! Removes passwords of any length or complexity. No software to install.
View original post
1
Add a comment...
 
+Passcovery. Just solve the lost password problem announces the release of #AccentRPR, 3.51, a program to quickly restore RAR3/RAR5 password on AMD/NVIDIA video cards.

The program features improved work with complex dictionaries and offers better user experience.
 
As you might know, Passcovery programs sport excellent dictionary attack. Our software can do some crazy stuff with dictionaries, in fact almost anything you can imagine: merge dictionaries, alter case of characters, replace symbols or interchange them and many more. Watch examples on our YouTube channel

The 3.51 update of #AccentRPR brings in even better work with dictionaries. We have fixed indexing of dictionaries with “words” ranging from 256 to 1024 symbols long.

Also, the recovered #RARpassword cache stays visible even after the password protect file is removed form the disk.

Demo versions of our tools for quick recovery of passwords are available at the Passcovery website: http://passwordrecoverytools.com/download.asp
View original post
1
Add a comment...
 
How to brute-force 8'500 iPhone passwords per second on an old laptop
 
Authors of the industry-fastest iPhone/iPad ‪#‎passwordrecovery‬ tool explain how ‪#‎Passcovery‬Suite can brute-force thousands of passwords in one second (compared with just hundreds some other tools can crack), offer video tutorials on efficient ‪#‎iPhonepassword‬ cracking and tell their thoughts on Apple’s rejection of FBI request to unlock iPhone.
View original post
1
Add a comment...
 
Our clients love us :)
 
Q: How can I be sure AccessBack.com is not a scam, and I will get my decrypted file after the purchase?
A: ⇓⇓⇓
View original post
1
Add a comment...
Have them in circles
127 people
Duane Elihu Xavier's profile photo
Chyna Xiong's profile photo
Johnnie Roberts's profile photo
Audrey Rauch's profile photo
algenid alhamim's profile photo
Daniel Maclin's profile photo
Peter Cox's profile photo
Denis Gladysh's profile photo
Aidan O'Brien's profile photo
 
 
We have had a conflict with a user from India. Satish (that’s his name) paid for decrypting a file on https://AccessBack.com, but didn't get his unprotected Excel document afterwards. We investigated the issue and glad to report the happy ending – the user is 100% satisfied and even left his testimonial:

“Thanks a lot..to solve my problem....my experience with your service is excellent and convinient...... Thanks very much.... I also received my file....good service...keep it up... ”

And here was the problem: when Satish uploaded the file to decrypt he used one e-mail address, and when he paid for the service he used another one. As a result, #AccessBack didn’t know where the #decryptedfile should be sent to. The service couldn’t link the payment to the file. And the user wasted some time on writing as and on waiting while we settle the issue.

Surely, we are great, but there are other pleasant ways to spend your time.

Don’t repeat Satish’s mistake – use the same e-mail when you upload the file to AccessBack.com and when you pay for decryption of your #passwordprotected Word or Excel file.

Or simply upload the file again using the e-mail from the order. AccessBack.com will decrypt the file again and will send the document to you without the password.
View original post
1
Add a comment...
 
+Passcovery. Just solve the lost password problem on Extended Mask usage in its #passwordrecovery products using GPU:
 
How to save your time and test only specific passwords made up of certain symbols in a certain order? See the example in our knowledge base: 
View original post
1
Add a comment...
 
We have finished transferring the main Passcovery domains to HTTPS, a secure communication protocol. Now, you can safely visit our websites knowing for sure all data exchange is under firm protection, and what you see on our website is exactly what we want to show you.

The guarantee of the secure connection is a security EV certificate you always see in the address bar of your browser: 
View original post
1
Add a comment...
 
 
Passcovery managed to get to a worthy review catalog of digital forensics developers published in the Event Log Explorer blog.

It provides quite an accurate description of #PasscoverySuite, but I would like to add that the Ultimate License is shipped with original #RainbowTables for guaranteed decryption of Excel/Word/PDF documents with 40-bit encryption. The same Rainbow Tables underlie our online service AccessBack.com too.

In the previous post we talked about 010 Editor, Event Log Explorer, ElcomSoft and Oxygen forensic solutions. In this blog post, we continue the brief review of prominent forensic tools. Next on our list is Belkasoft. Belkasoft Evidence Center 2016 Belkasoft Evidence Center is an all-around for
View original post
1
Add a comment...
 
 
We have received an acrid comment on the performance of XLSX-document protection cracking in #AccentOPR.

It won’t be any faster with #Excel2007-2016, - we say, - And if you don’t care about security of your data at all and only interested in fast cracking – use #Excel97 (xls-files). #Passcovery has nice #rainbowtables for its documents...

http://passcovery.com/helpdesk/knowledgebase.php?article=67 
View original post
1
Add a comment...
 
Accent #RARPasswordRecovery can help a lot if you know something about the password...
1
Add a comment...
People
Have them in circles
127 people
Duane Elihu Xavier's profile photo
Chyna Xiong's profile photo
Johnnie Roberts's profile photo
Audrey Rauch's profile photo
algenid alhamim's profile photo
Daniel Maclin's profile photo
Peter Cox's profile photo
Denis Gladysh's profile photo
Aidan O'Brien's profile photo
Story
Tagline
Professional password recovery for Office/Zip/Rar files
Introduction
We supplies high-speed, professional software solutions for recovering lost passwords. The first versions of these solutions were released in 1999. Today, our software is successfully used by law enforcement, government agencies, corporations and private individuals around the world.
Contact Information
Contact info
Email