Password recovery
Demonstrates how to use OSForensics to search for passwords stored in web browsers (IE, FireFox, Chrome) and how to retrieve passwords of encrypted documents (Word, Excel, PDF, ZIP). www.osforensics.com
Closed Caption:
me
with us friends 6 you can recover
browser passwords
use rainbow tables to quickly look up a
password for hash for that poss what is
known
and decrypts Office documents OS
forensics can recover passwords that
have been saved by users into the web
browsers
you can also find sites where user has
chosen not to remember password
from the OS forensics thought window
select passwords from the system
artifacts section
select the find out the password stab
and then select current machine
alternatively you may wish to scan a
drive
one selected click to retrieve passwords
button
you will then be presented with
collected information
right click to copy information to the
clipboard
want to exploit the list to the current
active case
from the manage case when do we can see
the discovered brought the password is
automatically added to the current case
OS friends ex will allow you to cook
files that use forty bit encryption
from the oldest friends ex tot window
select passwords from the system
not affect section select the decryption
and password recovery tab
we now need to select the encrypted file
the options will change based on the
type of office documents elected
with the selected document the options
are now for forty bit to corruption
select the output location
and click the start button
once the key has been found you can
choose to view the decryption office
document
OS forensics will allow you to create
files using different methods to recover
the password
in a brute force password attack there
are two modes of operation
random passwords can be generated BIOS
forensics
aware dictionaries can be used we now
need to select the encrypted file
OS friendships comes with a number a
pre-made dictionaries such as common
passwords but it is also possible to
build your own custom dictionary from
the contents and the hard drive being
investigated
this exploits the fact that many people
use weak passwords to protect their
files
and custom dictionaries contract
documents in a fraction of the time
normally required
finally click the start button
once the password has been found you can
choose to view that a group to document
don't forget to visit the ice forensics
website at Tyler's friend 6 dot com for
more product demonstrations
me
Video Length: 03:07
Uploaded By: PassMark Software
View Count: 2,876