73 results found
-
Safeend Protector Encrypted Portable Storage Media
Support for SafeEnd Protector Encrypted USB drives -
https://www.safend.com/product/encryptor/3 votes -
SQLCIPHER
For all sql encryption support
9 votes -
1 vote
-
Dockerization / Containerization of Passware Forensic Kit Agent
To make use of the most up to date server and cloud infrastructure, the Linux and Windows agents should be refactored to support a deployment as a Docker image.
In such a containerization, the software will then be able to rapidly scale up and down (depending on the needed agent requirements for the cracking attempt) with software such as Kubernetes.
Ideally, the Forensic Kit agent would also have features added to spin up agent instances (via Kubernetes as Docker images, or pure VM instances as images), to be able to utilize any required cloud provider that offers hosted GPUs (Azure…
7 votes -
Keyboard walking support
It's kind of a special attack. Generally, it is used for long passwords, users use it to easily remember their passwords.
You can find out more about it from this site:
https://bytesdarkly.com/2014/08/generating-keyboard-walks/14 votes -
BestCrypt Volume Encryption
Add brute force attack for Best Crypt Volume Encryption by Jetico
8 votes -
Add support for decrypting TLS sessions
Decryption of sessions from packet captures, if possible. Possibly by getting site cert info from live site and using key exchange in the packet capture? I know Wireshark can do this, but only for RSA key exchanges. Support for all TLS sessions would be very useful (at least to me :-) ) Thank you.
3 votes -
Password carve on android images.
Add password recovery on android images. For example "web site passwords, netword passwords, outlook passwords, user passwords, etc".
10 votes -
4 votes
-
Support for 2FA in iCloud backups
Add support for 2-factor authentification for iCloud backups
8 votes -
If we can do 2 different attack at the same time
If we can do 2 different attack at the same time, we can use GPU's for hardware accelerated attacks and we can use CPU's for not hardware accelerated attacks. For example if we have a truecrypt file and a pdf file I want to use GPU's for truecrypt files and I want to use CPU's for pdf files. This could accelerate total access process.
8 votes -
1 vote
-
Automatic Customized Attacks using Known Passwords
I frequently have times when I have known passwords but these don't work on a file, but a variation does. I'd like to be able to give Passware the passwords I know (through text files, CSV, etc.) and have it generate attacks based on those. For example, if my known password is target123s, it would try target###?, and then target123s?, and then target123s?? (etc), and then all of these with a capital "T" on target, and an all caps "TARGET". On a recent case, I spent hours generating these attacks because of the variance of passwords the suspect used.
35 votes -
10 votes
-
share custom rules with details describing attack and feedback
Have a place on your website or forum, members only, that would allow you to upload and share custom attacks along with details and comments.
13 votes -
Import CSV list of full file paths of files to crack and option to save back to those original paths
13 votes -
A professional password safe, which would protect passwords.
Given Passware's experience is decrypting passwords, and the need to protect data, it would be an ideal poacher turned gamekeeper situation, which could result in an excellent sophisticated product. Included would be high quality generated passwords, stored safely. This would not only protect password protected sites / log ons, but also protect the passwords them selves.
11 votes -
Dictionary generation tools
Generate custom dictionaries based on BIO data, website browsing history, etc.
89 votes -
13 votes
-
compile an agent for OSX since the power of a Mac Pro will significantly boost the calculation on passwords
Having so much calculating power in our department unused on Mac Pros and iMacs...
10 votes
- Don't see your idea?