Our Elcomsoft Tool Evaluation team started out the next sprint by setting off to evaluate the tools relating to phones, computers, and office products. To catch up on the beginning of our process, read our first blog post here. The new tools we evaluated included Advanced Office Password Recovery, Advanced WordPerfect Office Password Recovery, Elcomsoft Phone Viewer, Elcomsoft eXplorer for WhatsApp, and Elcomsoft Password Digger.
We used the following scoring system to evaluate the tools:
1- Beginner: user can navigate the program without any prior knowledge
3- Novice: user requires basic knowledge of the program and how it works
5- Intermediate: user needs some previous experience working with the program
8- Advanced: user must have a lot of experience working with the program
13- Superior: user must be an expert on the program and capable of teaching others how to use itAdvanced Office Password Recovery
Advanced Office Password Recovery proved to be an extremely useful tool. The program opens with an interface that is simple and easy to understand. This interface includes a log window so the user can see what is processing as they are using the tool. There’s also a help tab with an instruction manual that’s found right inside the program for new users. Another advantage is that it accepts different document file types so the user doesn’t have to worry about any conversions.
When the user wants to start an attack, they will have many different options ranging from a bruteforce attack to combination and hybrid attacks (these can all be read about in the manual). This gives the user many different options depending on the type of encryption they are dealing with. When the user selects the type of attack they want, a window will pop-up allowing them to enter specifications for the encryption that can allow the tool to work faster, e.g. password size, character parameters.
AOPR takes a good amount of time to decipher the password based on size and the type of attack. As the process is running, the tool will let the user know the passwords that are being tried and how many passwords are being tried per second. This is nice for the user so they can see how efficient the program is working and make sure they entered the right parameters so the tool can find the right password. In order to test the tool’s capabilities, we tested a range of different passwords that varied in complexity from six characters with only English characters, twelve characters that included numbers, and eighteen characters that included numbers and symbols.
Overall, this tool earns a 3 because only limited experience required in order to operate most of the processes. The part that requires the most knowledge is deciding which attack to use for a specific password. Although the password apprehension process might take a long time, it is functional and can recover any password, no matter the complexity.Elcomsoft Phone Viewer
After using the Elcomsoft Phone Viewer, we would rate it a score of 3, or novice. The program gives multiple options to access backup information from an iPhone, BlackBerry, and Microsoft account data. The need for basic understanding comes in when trying to figure out which backup works best with the tool. The process we are using for the tool is an iTunes backup. We downloaded iTunes onto the desktop and synced the phone to the computer. Once complete, we clicked on iTunes backup and chose the iPhone 8 device. Then we allowed access to all information from the iPhone. After typing in the encrypted passcode, it took only twenty-seven seconds to download the iTunes backup and get access to the main interface of the tool. The time can vary due to the size of the backup.
The main interface is very user-friendly. With only some knowledge on these devices, our team had an easy time evaluating this tool. It shows the iPhone user, the type of phone, iOS version, Serial Number, GUID, IMEI, Unique Identifier, and last backup date. The Elcomsoft Phone Viewer gives us access to the applications, calendar, calls, contacts, locations, media, messages, notes, notifications, Wallet, Web and Wi-Fi. Within each category, it goes into depth with information that can be filtered to find more exact information. For example, in applications, the user can search for a specific app without looking through the list. This allows the tool to be efficient in finding the information the user wants. This tool also has a help option that explains the tool in great detail that is understandable for anyone with limited knowledge.Advanced WordPerfect Office Password Recovery
Advanced WordPerfect Office Password Recovery is an extremely simple yet useful tool. When first opened, the tool presents an interface with only four options that include: open file, help contents, about, and quit. For convenience, there is an instruction manual under the help contents section if the user needs. In order to recover a password, all the user has to do is open a WordPerfect file and the tool will do the rest. There were multiple documents tested with passwords varying in complexity and the tool was still able to decipher the passwords in a matter of seconds. The complexity of the passwords included six characters with only English characters, twelve characters that included numbers, and eighteen characters that included numbers and symbols.
Not only does the tool output the password of the document but it also shows the equivalent in hexadecimal which is a nice addition. The status window only shows what is absolutely necessary and doesn’t overstimulate the user with too many statistics. Our only objection with the program is that it only accepts WordPerfect files and it doesn’t convert other documents for the user. However, his really isn’t an issue with the tool as its purpose is only to decipher WordPerfect files.
We would rank this tool a 1. The tool does everything as promised and is extremely simple and user-friendly. It works very fast and efficiently and can be navigated without any knowledge of the tool or password recovery in general.Elcomsoft eXplorer for WhatsApp
After using the Elcomsoft eXplorer for WhatsApp, we would rank this tool a 3, or novice. The tool gives multiple ways to access the WhatsApp account for Apple and Android users. Depending on the device, the user needs some knowledge of the device and the best way to download the accounts. For the Elcomsoft eXplorer for WhatsApp, we used the iTunes backup. We have found this to be the most useful way to access the information for the tools involving Apple. In the tool, we clicked on the Apple icon and pressed the option to load the iTunes/iCloud backup. We clicked on the iPhone 8 device and entered the password for the encrypted backup. It took about thirty-two seconds to download, but it can vary due to the size of the download.
The main interface is very user-friendly and the main purpose of the tool is easily conveyed. Our team found our way around the tool with the basic knowledge we learned from the videos on Elcomsoft’s website. The built-in viewer gives great information that is easy to follow. It shows the account’s phone number and when the account was created. It also includes information about the device, product type, full user name, client version, and the size of the information used on the account. The tool gives access to WhatsApp calls, contacts, media, and messages and we could easily search for information with the filtering application. If there are questions, there is a help button with clear instructions that are easy to follow.Advanced Office Password Breaker
We found Advanced Office Password Breaker to be an efficient and useful tool would recommend it to certain users. Upon opening the tool, the user will be greeted with a simplistic design. This includes a way to select the encrypted file the user wishes to crack, an area allowing the user to choose where the info about the process can be saved after it is completed, and a box that tells the user the remaining time left. In order to be able to understand the entirety of the interface as well as all the features of the application, a user will have to read through the available manual l and spend some time getting to know it better.
Documents with different passwords were tested in this tool. These passwords ranged in complexity from six lowercase characters all the way to eighteen characters with uppercase characters, numbers, and symbols. The tool was able to break into all the documents regardless of the password. It should be noted that the longer and more complex the password, the longer the tests took. On the upside of this, the program does notify the user the estimated time remaining which is a nice feature.
After this program had been put through its tests, we decided to give it a score of 5. The tool is very useful and by all means accomplishes all the features it promises in the description. However, it does require a fair amount of experience to use to its full capabilities. This can be achieved by reading through the manual or by trial and error testing in the program. Whatever the case, this program will need a user who knows what they are doing to operate the tool as well as understand everything on the interface.Elcomsoft Password Digger
After using the Elcomsoft Password Digger, we would rate this a 3, or novice. Our team had a basic understanding of the tool and learned more as we used it. In order to extract the passwords from Mac OS X, we had to gain access to the user keychain file of the computer. In order to test this tool, we had access to a Mac computer and download the keychain file onto a USB. Along with access to the file, we needed the password to the computer. Next, we extracted the user keychain file. It had twenty user keychains, no decryption results, and processed twenty passcodes. We exported the passwords to an XML file. Our team decided where we would save the document and then pressed new task. The XMl file opened in Internet Explorer and accessed the passwords.
The Password Digger’s main interface is very straight forward. The tool meets all the requirements and provides information on how to use the tool if needed. Elcomsoft Password Digger was able to extract, decrypt, and export the content of the keychains. The file created can be used to build a custom dictionary attack with the user’s real passwords to improve password recovery attacks. Also, the tool was able to export full keychain data into an encrypted XML file.Elcomsoft Phone Breaker
One obstacle that our team came across was using the Elcomsoft Phone Breaker. Unfortunately, we could not rate this tool since we could not evaluate its use. The issue we ran into was the iCloud backups had been temporarily disabled. The tool is able to sign in to the iCloud account, but cannot download the information into the tool. Elcomsoft explains that:
“Apple is instantly improving access and download protocols for backups. Our research and develop teams do their best to fix this problem as soon as possible. Please ensure that you have the latest version of Elcomsoft Phone Breaker and feel free to contact our support team if you have any questions.”
With the access that we do have to the tool, the interface is easy to understand. There are two tabs that show up; the Password Recovery Wizard and Tools. The tool is designed to break passwords and decrypt iOS backups, decrypt iCloud Keychain and Messages with media files and documents from iCloud, obtain synchronized data from Apple and Microsoft accounts, and download iCloud backups and synced data with or without Apple ID passwords. Testing the iCloud backup is where our issue occurred. When working properly, this tool is great when used with Elcomsoft’s other password recovery tools.Conclusion
Our team learned a lot about Elcomsoft’s tools from our evaluation. Each tool has its own unique functions that can help users in many ways. So far, these tools are user-friendly and meet the requirements set forth by Elcomsoft. Our team had a basic understanding of how to use these tools, which made evaluating them much easier. For the future, our team will continue to evaluate the Advanced Archive Password Recovery, Advanced PDF Password Recovery, Distributed Password Recovery, Elcomsoft Cloud eXplorer, Elcomsoft Internet Password Breaker, Proactive System Password Recovery, and Elcomsoft System Recovery. We will continue to produce comprehensive results for the LCDI and Elcomsoft.
Be sure to check us out on Twitter @ChampForensics, Instagram @ChampForensics, and Facebook @ChamplainLCDI to keep up to date with our evaluations!
The post Elcomsoft Tool Evaluation Blog 2 appeared first on The Leahy Center for Digital Investigation.