Passware, Inc., a provider of password recovery, decryption, and electronic evidence discovery software for computer forensics, law enforcement organizations, government agencies, and private investigators, celebrates the 20th anniversary of its flagship product with the release of Passware Kit Forensic 2018 v1. The new release – the biggest update ever – of the acclaimed electronic evidence discovery now leverages advanced methods to decrypt the new Apple Files System (APFS) disks, which include memory analysis and leaked passwords dictionary.
Apple File System (APFS) is a proprietary file system introduced as part of macOS High Sierra. After decryption of an APFS disk, computer forensics can further extract and decrypt a keychain file, which provides access to dozens of user login credentials – all with the help of Passware Kit Forensic 2018 v1.
How it Works
When a memory image of a target Mac computer is available, the decryption takes only minutes to perform. In cases in which live memory analysis is not an option, Passware Kit uses a brute-force approach to recover the APFS user password.
In brute-force password recovery, Passware Kit uses a new passwords dictionary that significantly increases the chances of recovering even complex passwords. The new dictionary contains over 2.5 billion passwords compiled by Passware from the recent passwords leaks. This dictionary is now available to all active Passware Kit customers for download at their customer portals.
“We are proud to celebrate our 20th anniversary with the biggest release ever. The latest update ensures that Passware Kit Forensic remains the industry’s most complete encrypted electronic evidence discovery solution,” said Dmitry Sumin, CEO of Passware. “Now computer investigators can efficiently and effectively access encrypted evidence on all platforms – Windows, Mac, and in the Cloud.”
Other features of Passware Kit Forensic 2018 v1 include:
redesigned user interface;
decryption of macOS High Sierra keychains;
one-step memory analysis;
support for password mistypes;
optimized algorithms for faster recovery of TrueCrypt, Android, Zip, and many other types of passwords.
All of these features are designed to improve the efficiency of the decryption tool trusted by forensic and security professionals worldwide.