Existing Decrypted Physical
There has been multiple cases where I was able to use an alternate tool to dump a physical extraction that wasn't on the Passware support list, but that tool didn't provide me with the password/pattern/pincode as it could decrypt the data without it.
I'd love if I could point PKM to the existing extraction, and start a BruteForce project. Even on a supported device Passware has to dump it to continue to the BruteForce step.
5
votes
