Passware Kit User Guide
Passware Kit User Guide
Passware Kit
User Guide
www.LostPassword.com
Overview of the Passware Kit
You can use the Passware Kit to recover lost file, e-mail, and Internet
passwords, as well as search for password-protected files.
2. Click the link on the Start Page that relates to the type of password you
want to recover (file, e-mail and network, or Windows Administrator).
3. Follow the instructions on the screen -- for some types of passwords, such
as file passwords, you have to fill out a few fields; for other types, such as
Outlook Express account passwords, the password recovery process starts
immediately.
4. When the password recovery process is complete, the results are displayed
in the window.
5. You can then save and print the results.
NOTE: At any time when using Passware Recovery Kit, you can click the Start
Page button at the top of the screen to cancel out of what you are doing and
start over.
The wider, right pane is where you select choices, enter values, and view
password recovery and protected file search results.
At the bottom of the window is a status bar that may contain hints on how to
proceed.
Working with Passware Kit
You can use the Passware Kit to recover lost passwords, wherever they are --
file passwords, e-mail account passwords, Internet passwords, and VPN and
network passwords.
The quickest way to start password recovery for a file is to click the Recover
button on the Start Page, or press Ctrl+O.
Once the Passware Kit discovers the password for a file, it remembers that
password. If you ever forget the same password, you don't have to run all the
attacks again - simply select the file, and the Passware Kit displays the
password immediately.
If one or more passwords in the original file were reset (changed) or removed
(for example, QuickBooks QBW passwords to open or MS Excel Workbook and
Worksheet passwords), the Passware Kit creates an unprotected file that is
listed in the results of the password recovery process. If the Passware Kit
recovers all original passwords, it doesnt create the unprotected file (for
example, MS Excel passwords to open and MS Access passwords).
Use the Password Recovery Wizard - best for users who know
something about their passwords, but are new to password
recovery.
Run the default attacks - best for users who know nothing about
their passwords.
Use the Attack Editor - best for advanced users and who are
decrypting strong passwords.
Learn about reports and log files
Using the Attack Wizard
The Attack Wizard walks you through setting up your search for a lost file
password, step-by-step. The Attack Wizard is best for situations where you
know something about the password, but are new to password recovery.
When you complete the Wizard, Passware Kit automatically sets up the proper
password recovery attacks, based on your answers.
Starting the Attack Wizard
1. Launch the Passware Kit application.
2. Click Recover File Password (or press Ctrl+O). This displays the Open
dialog box.
3. Choose the file for which you want to find the password, and click Open.
This displays the screen shown below:
NOTE: At any point in the Attack Wizard, you can click the Skip and Start
button to simply start recovering your password - but bear in mind that the
recovery process may take longer, or be less successful, than if you had
completed the wizard.
The first Attack Wizard screen, shown below, asks you to supply the general
format of the password. For example, does it consist of one dictionary word, or
more than one? Choose the best selection and click Next.
From this point forward, the Attack Wizard screens differ, depending on which
general format you choose.
The attacks start immediately, and when finished, the results appear in the
window.
Which Attacks Are Run
The following list describes the default attacks, in the order in which they are
run, and gives examples of the sort of password each attack is best at finding,
where appropriate.
The Attack Editor appears, a sample of which is shown in the following figure.
The Attack Editor window is divided into three parts. On the left, you see
available actions and details. In the middle are the attacks which will be run,
and on the right is an "attack tree" which lists available attacks and attack
modifiers.
Once you have the attacks the way you want them, start the attacks by
clicking the Start Recovery button in the bottom right corner of the
Attack Editor window
clicking on the Start Recovery selection in the Actions area of the left
pane.
Add an attack
Remove an attack
Rearrange Attacks
Use Attack Modifiers
Reset attack settings to their default values
Save or load attacks
Sort attacks according to duration
Reports and Log Files
The Passware Kit provides several reports and log files that track its activity
during a password recovery operation. You can print and save these files for
future reference.
Passwords Found Report
Once an attack is complete, the Passware Kit displays the results of the
password recovery process in the Passwords Found Report, a sample of which
is shown below:
In the report, you'll see any recovered passwords. Click on a "copy" link to
copy a password to the Windows Clipboard. For files with instant unprotection,
you can click on a filename to open a protected or unprotected file
Attacks Report
The Passware Kit also reports which attacks it used, how long they took, their
state (such as started, successful, or unsuccessful), and what passwords were
recovered by which attacks. To view this report, click the Attacks tab at the
bottom of the window. A sample Attacks Report is shown below:
Log
A third type of information provided by the Passware Kit is a log that tracks
each attack's start and stop time, and other useful information. To view the
log, click the Log tab at the bottom of the window. A sample Log is shown
below:
You can also initiate password recovery for multiple files from the results of
the Search for Protected Files option. Select the files that you want to
decrypt from the list of encrypted files displayed by Passware Kit. Then click
the Recover button as shown below:
Groups and Settings
Once you have selected the files to decrypt, Passware Kit groups them
according to the decryption options, i.e., Known Password, Instant,
Default. You can add, modify, or delete groups.
For each group (except for Known Password and Instant groups, for which
the password is recovered instantly regardless of its settings) you can use the
Predefined settings, or customize them in Attack Editor. Click the Save
Settings and Return button to save the changes and return to the list of
files.
Recovering the Passwords
Once you have set up the list of files and password recovery attacks, click the
Recover button to start the batch password recovery process:
While the password recovery is in progress, you can pause, resume, or stop it,
as well as skip attacks, files, or groups.
1. Click Search for Protected Files on the Passware Kit start page:
2. Click the Start Scan button in the bottom-right corner of the window. This
scans your entire computer system for password-protected files.
You can also select the type of scan you want to use. A full scan includes
scanning system folders, slow file types, encrypted containers and disk images,
and calculating MD5 values. You can disable these options if you need a less
complete, but much faster scan.
After you have chosen the type of scan and the folders and/or drives to scan,
start the scan by clicking the Start button on the toolbar, which looks like this:
Scan Options
The software offers four options of the scan. Which one you use depends on
what type of password-protected file you are looking for, and how fast you
want the scan to run.
Scan
Option When to Use
Scan System folders and registry files are unlikely to contain any
system encrypted items. It is appropriate to use this option only if you
folders need the full system scan.
Scan slow Some file types, such as MS SQL and ACT! databases, or any
file types unknown types of files, are slow to analyze. Disable this option
to make the scan faster, or enable it if you need the complete
scan of the file system.
Scan for Use this option if you assume that your system has TrueCrypt
encrypted containers and other disk images. There might be false
containers positives with this option.
and disk
images
Calculate Use this option if you need your reports completed with MD5
MD5 hash values for each encrypted file detected. Otherwise,
disable it as it slows down the scan speed.
Enable or disable these options in the Scan Options area of the window,
shown below:
Next, you can choose what to scan.
NOTE: The settings you choose in the Scan Options area are saved when you
exit the application, and are in effect the next time you launch the program.
Monitoring Scan Progress
You can track the progress of the scan in several ways:
The Scan Progress area at the top of the main window displays a
graphical progress bar, and lists time elapsed and time-to-completion. A
sample Scan Progress area is shown here:
The Status Bar, visible along the bottom of the window, gives a summary
of the number of protected items found and the total number of items
scanned.
The Scan Status area summarized the scan status. A sample is shown
here:
NOTE: If you want, you can turn off the Status Bar.
You can cancel a scan at any time by clicking the Stop button in the toolbar:
Working with the Scan Results
After scanning the selected folders, the application displays a both a list of
password-protected files (in the right pane of the window) and a summary of
the scan results (in the Last Scan area on the left side of the window). An
sample scan result is shown below:
NOTE: Clicking on the Items Skipped line in the Last Scan area displays the
scan log.
Another way to start a new Scan is to click the Back button on the toolbar.
CAUTION: The results of the previous scan are cleared from the screen when
you click Yes. If you want to save the results for future use, be sure to save
the file list before starting a new scan.
Analyzing Memory and Decrypting Hard Disks
You can use the Passware Kit to decrypt hard disks encrypted with BitLocker,
TrueCrypt or FileVault 2.
To get started, display the Passware Kit Start Page, and click Analyze
Memory and Decrypt Hard Disk (or press Ctrl+D). This displays the
following window:
The software scans the physical memory image file (created while the
encrypted disk was mounted) and extracts all the encryption keys for a given
volume.
To recover BitLocker encryption keys, two images of the target system are
required:
Disk volume images can be created using third-party tools, such as Guidance
EnCase, Free EASIS Drive Cloning, or DD. Physical memory images can be
created using Passware FireWire Memory Imager or third-party tools, such as
ManTech Physical Memory Dump Utility or win32dd. If the target computer
with the BitLocker volume is powered off, encryption keys are not stored in its
memory, but they could be possibly recovered from the hiberfil.sys file, which
is automatically created when a system hibernates.
NOTE: If the target computer is turned off and the BitLocker volume was
dismounted during the last hibernation, neither the memory image nor the
hiberfil.sys file will contain the encryption keys. Therefore, instant decryption
of the volume is impossible. In this case, Passware Kit assigns Brute-force
attacks to recover the original password for the volume.
Once the images are created, follow these steps to recover the password:
1. Click Analyzing Memory and Decrypting Hard Disk (or press Ctrl+D)
on the Passware Kit Start Page. This displays the screen shown below:
2. Click BitLocker (or press Ctrl+B). This displays the screen shown below:
3. Click Browse and locate the image file of the BitLocker encrypted volume
or partition.
4. Click Browse and locate the physical memory image (memory.bin) or the
hiberfil.sys file from the computer to which your encrypted volume was
mounted. If you do not have this memory image and the target computer
is still powered on, click Acquire a memory image and follow the on-
screen instructions.
NOTE: If the target computer is turned off and the BitLocker volume was
dismounted during the last hibernation, neither the memory image nor the
hiberfil.sys file will contain the encryption keys. Therefore, instant
decryption of the volume is impossible. In this case, switch to The
BitLocker volume is dismounted option, and Passware Kit will assign
Brute-force attacks to recover the password for the volume.
5. Click Next.
This procedure initiates the encryption key recovery process. The recovery
might take several minutes depending on the size of the memory image file.
The results are displayed when the recovery is complete. The figure below
shows a sample result.
Decrypting a TrueCrypt Volume
Passware Kit decrypts hard disk volumes encrypted with TrueCrypt. TrueCrypt
is a software application that creates virtual hard disks with real-time
encryption.
The software scans the physical memory image file (created while the
encrypted disk was mounted), extracts all the encryption keys, decrypts the
given volume, and saves the image of the decrypted volume.
The Passware Kit can work with either a TrueCrypt volume file (encrypted file
container), or with its image.
Disk volume images can be created using third-party tools, such as Guidance
EnCase, Free EASIS Drive Cloning, or DD. Physical memory images can be
created using Passware FireWire Memory Imager or third-party tools, such as
ManTech Physical Memory Dump Utility or win32dd. If the target computer
with the TrueCrypt volume is powered off, encryption keys are not stored in its
memory, but they could be possibly recovered from the hiberfil.sys file, which
is automatically created when a system hibernates.
NOTE: If the target computer is turned off and the TrueCrypt volume was
dismounted during the last hibernation, neither the memory image nor the
hiberfil.sys file will contain the encryption keys. Therefore, instant decryption
of the volume is impossible. In this case, Passware Kit assigns Brute-force
attacks to recover the original password for the volume.
Once the images are created, follow these steps to recover the password:
1. Click Analyzing Memory and Decrypting Hard Disk (or press Ctrl+D)
on the Passware Kit Start Page. This displays the screen shown below:
2. Click TrueCrypt (or press Ctrl+T). This displays the screen shown below:
3. Click Browse and locate the TrueCrypt volume file or its image file.
4. Click Browse and locate the physical memory image (memory.bin) or the
hiberfil.sys file from the computer to which your encrypted volume was
mounted. If you do not have this memory image and the target computer
is still powered on, click Acquire a memory image and follow the on-
screen instructions.
NOTE: If the target computer is turned off and the TrueCrypt volume was
dismounted during the last hibernation, neither the memory image nor the
hiberfil.sys file will contain the encryption keys. Therefore, instant
decryption of the volume is impossible. In this case, switch to The
TrueCrypt volume is dismounted option, and Passware Kit will assign
Brute-force attacks to recover the password for the volume.
5. Click Browse and select the location and name of the destination file (the
image of the decrypted volume).
6. Click Next.
This procedure initiates the decryption process. The decryption might take
several minutes depending on the size of the memory image file. The results
are displayed when the decryption is complete. The figure below shows a
sample result.
Decrypting a PGP WDE Volume
Passware Kit decrypts hard disk volumes encrypted with PGP Whole Disk
Encryption.
The software scans the physical memory image file (created while the
encrypted disk was mounted), extracts all the encryption keys, decrypts the
given volume, and saves the image of the decrypted volume.
To decrypt a PGP volume, the physical memory image file or hiberfil.sys file
from the target system (with the encrypted volume mounted) is required. PGP
volume images can be created using third-party tools, such as Guidance
EnCase, Free EASIS Drive Cloning, or DD. Physical memory images can be
created using Passware FireWire Memory Imager or third-party tools, such as
ManTech Physical Memory Dump Utility or win32dd. If the target computer
with the PGP volume is powered off, encryption keys are not stored in its
memory, but they could be possibly recovered from the hiberfil.sys file, which
is automatically created when a system hibernates.
NOTE: If the target computer is turned off and the PGP volume was
dismounted during the last hibernation, neither the memory image nor the
hiberfil.sys file will contain the encryption keys. Therefore, instant decryption
of the volume is impossible. In this case, Passware Kit assigns brute-force
attacks to recover the original password for the volume.
Once the images are created, follow these steps to recover the password:
1. Click Analyze Memory and Decrypt Hard Disk (or press Ctrl+D) on the
Passware Kit Start Page. This displays the screen shown below:
2. Click PGP WDE (or press Ctrl+P). This displays the screen shown below:
3. Click Browse and locate the encrypted PGP volume image file.
4. Click Browse and locate the physical memory image (memory.bin) or the
hiberfil.sys file from the computer to which your encrypted volume was
mounted. If you do not have this memory image and the target computer
is still powered on, click Acquire a memory image and follow the on-
screen instructions.
NOTE: If the target computer is turned off and the PGP volume was
dismounted during the last hibernation, neither the memory image nor the
hiberfil.sys file will contain the encryption keys. Therefore, instant
decryption of the volume is impossible. In this case, switch to The PGP
disk is dismounted option, and Passware Kit will assign brute-force
attacks to recover the password for the volume.
5. Click Browse and select the location and name of the destination folder
(the folder to save decrypted volume to).
6. Click Next.
This procedure initiates the decryption process. The decryption might take
several minutes depending on the size of the memory image file. The results
are displayed when the decryption is complete. The figure below shows a
sample result.
Recovering Mac Passwords
You can use Passware Kit to recover the following passwords for Mac OS: user
login passwords and keychain file passwords.
The software scans the physical memory image file (created when the
encrypted disk was mounted), extracts all the encryption keys, decrypts the
given volume, and saves an image of the decrypted volume.
To recover FileVault2 encryption keys, two images of the target system are
required:
NOTE: If the target computer is turned off, the memory image will not contain
the encryption keys. Therefore, instant decryption of the volume is impossible.
In this case, Passware Kit assigns brute-force attacks to recover the original
password for the volume.
Once the images are created, follow these steps to recover the encryption key:
1. Click Analyze Memory and Decrypt Hard Disk on the Passware Kit
Start Page. This displays the screen shown below:
2. Click FileVault. This displays the screen shown below:
3. Click Browse... and locate the image of the FileVault2 encrypted volume
or partition.
4. Click Browse... and locate the physical memory image (memory.bin) file
from the computer in which your encrypted volume was mounted. If you
do not have this memory image and the target computer is still powered
on, click Acquire a memory image and follow the on-screen instructions.
NOTE: If the target computer is turned off, the memory image will not
contain the encryption keys. Therefore, instant decryption of the volume is
impossible. In this case, switch to the FileVault volume is dismounted
option, and Passware Kit will assign regular brute-force attacks to recover
the password for the volume.
5. Click Browse... and select the location and name of the destination file
(the image of the decrypted volume).
6. Click Next.
This procedure initiates the decryption process. The decryption might take
several minutes depending on the size of the memory image file. The results
are displayed when the decryption is complete. The figure below shows a
sample result.
Recovering a Mac FileVault2 Password
If the instant decryption option through memory analysis is not applicable,
e.g., if the target computer is turned off or the memory image does not
contain the encryption keys for some reason, Passware Kit can still recover the
original password for the FileVault disk.
Mount it with any disk-mounting tool and proceed to step 7. Steps 1 - 6 refer
to mounting the disk image using Guidance EnCase.
Once you have copied the Wipekey file to your computer, run Passware Kit and
follow these steps to recover the password:
1. Click Analyze Memory and Decrypt Hard Disk on the Passware Kit
Start Page. This displays the screen shown below:
3. Click Browse... and locate the image of the FileVault2 encrypted volume
or partition;
5. Click Browse... and select the location of the Wipekey file as shown
below:
6. Click Next.
This procedure initiates the decryption process. It might be accelerated using
NVIDIA and AMD GPU cards, as well as Distributed Password Recovery. The
results are displayed when the decryption is complete. The figure below shows
a sample result.
Recovering Mac Login Passwords
You can use Passware Kit to recover login passwords for Mac OS users in a
matter of minutes, regardless of the password length and use of a FileVault
encryption. The following operating systems are supported:
The software scans the physical memory image file (acquired while the target
system is running and at least one user remains logged in, even if the user is
currently logged out or the account is locked) and extracts all the login
passwords for a given system.
To get started, display the Passware Kit Start Page, and click Analyze
Memory and Decrypt Hard Disk | Mac User (or press Ctrl+M). This displays
the following window:
Locate the physical memory image (memory.bin) of the target Mac computer.
If you do not have this memory image, follow these steps to acquire it using
Passware Kit:
1. At the Passware Kit Start Page click Analyzing Memory and Decrypting
Hard Disk.
2. Click Passware FireWire Memory Imager.
3. Follow the on-screen instructions.
Once the image is created, follow these steps to recover the password:
1. Click Recover Mac Password (or press Ctrl+M) on the Passware Kit Start
Page.
2. Locate the physical memory image (memory.bin) from the target computer
and click Open.
The recovery might take several minutes depending on the size of the memory
image file. The results are displayed when the recovery is complete. The figure
below shows a sample result.
Recovering Mac Keychain Passwords
You can use Passware Kit to recover passwords for Mac OS keychain files. Files
from the following operating systems are supported:
To get started, display the Passware Kit Start Page, then click the Recover
button, or press Ctrl+O.
Locate the keychain file (by default this file is named login.keychain) and click
Open.
Choose one of the following options for password recovery, depending on the
available information about the password:
Use the Password Recovery Wizard - best for users who know
something about their passwords, but are new to password
recovery.
Run the default attacks - best for users who know nothing about
their passwords.
Use the Attack Editor - best for advanced users and who are
decrypting strong passwords.
This procedure initiates the password recovery process. The results are
displayed when the recovery is complete. The figure below shows a sample
result.
Recovering Windows Login Passwords
You can use Passware Kit to recover login passwords for Windows users in a
matter of minutes, regardless of the password length and use of a BitLocker
encryption. The solution works on all versions of Windows, including Windows
8.
The software scans the physical memory image file (acquired while the target
system is running, even if the user is currently logged out or the account is
locked) and extracts all the login passwords for a given system.
To get started, display the Passware Kit Start Page, and click Analyze
Memory and Decrypt Hard Disk | Windows User (or press Ctrl+W). This
displays the following window:
1. At the Passware Kit Start Page click Analyzing Memory and Decrypting
Hard Disk.
2. Click Passware FireWire Memory Imager.
3. Follow the on-screen instructions.
Once the image is created, follow these steps to recover the password:
1. Click Analyze Memory and Decrypt Hard Disk | Windows User (or
press Ctrl+W) on the Passware Kit Start Page.
2. Locate the physical memory image (memory.bin) or the hibernation file
(hiberfil.sys) from the target computer and click Open.
The recovery might take several minutes depending on the size of the memory
image file. The results are displayed when the recovery is complete. The figure
below shows a sample result.
Recovering Website Passwords from Memory
You can use Passware Kit to recover passwords for Facebook, Google, and
other websites in a matter of minutes, regardless of the password length and
whether the password was saved in the browser or not.
The software scans the physical memory image file (acquired while the target
system is running, even if the user is currently logged out or the account is
locked) and extracts all the websites' passwords which the user had typed
during the last session.
To get started, display the Passware Kit Start Page, and click Analyze
Memory and Decrypt Hard Disk | Websites (or press Ctrl+S). This displays
the following window:
1. At the Passware Kit Start Page click Analyzing Memory and Decrypting
Hard Disk.
2. Click Passware FireWire Memory Imager.
3. Follow the on-screen instructions.
Once the image is created, follow these steps to recover the password:
1. Click Analyze Memory and Decrypt Hard Disk | Websites (or press
Ctrl+S) on the Passware Kit Start Page.
2. Locate the physical memory image (memory.bin) or the hibernation file
(hiberfil.sys) from the target computer and click Open.
The recovery might take several minutes depending on the size of the memory
image file. The results are displayed when the recovery is complete. The figure
below shows a sample result.
Passware FireWire Memory Imager
To recover BitLocker and TrueCrypt encryption keys, Passware Kit requires a
physical memory image file of a target computer that was created while the
BitLocker or TrueCrypt encrypted disk was mounted.
The overall steps on acquiring the memory image with Passware FireWire
Memory Imager are:
NOTE:
If the target computer is powered off, encryption keys are not
stored in its memory, but they could be possibly recovered from the
hiberfil.sys file, which is automatically created when a system
hibernates.
If the target computer is powered off and the TrueCrypt/BitLocker
volume was dismounted during the last hibernation, neither the
memory image nor the hiberfil.sys file will contain the encryption
keys. Therefore, instant decryption of the volume is impossible. In
this case, Passware Kit assigns Brute-force attacks to recover the
original password for the volume.
Creating Passware FireWire Memory Imager USB
Drive
Below are the steps to create a memory-imaging USB drive.
1. On the Start Page click Analyzing Memory and Decrypting Hard Disk
(or press Ctrl+D), and then click Passware FireWire Memory Imager.
The following screen appears:
1. Insert a USB flash drive and select it in the Select USB drive pull-
down menu. Recommended size of the USB flash drive is 8GB and
more.
2. Click Next.
NOTE: All the files on the USB flash drive will be erased. If you are using
Windows Vista, you may need to run Passware Kit as the Administrator in
order to create a memory-imaging USB drive.
2. The recording process starts. Passware Kit copies the necessary files on the
USB flash drive.
3. The bootable Passware FireWire Memory Imager USB drive is now ready.
Now that you have created the memory-imaging USB drive, you are ready to
acquire the memory image of the target computer.
Acquiring Memory Image with Passware FireWire
Memory Imager USB Drive
Once you have created the bootable Passware FireWire Memory Imager USB
drive, you are ready to acquire the memory image of the target computer by
following the steps below.
Requirements:
The progress screen displays the time of the imaging process and the size
of the acquired target memory. Upon completion of the process, press
Next.
6. Unplug the FireWire cable, remove the USB flash drive, and press Reboot
to restart your PC.
7. The memory image of the target computer (a memory.bin file) is created
on the USB flash drive:
Once you have created the memory image of the target computer, you are
ready to decrypt BitLocker or TrueCrypt volumes using Passware Kit.
Recovering Passwords for Mobile Data
You can use the Passware Kit to acquire iCloud backups, recover passwords for
Apple iPhone and iPad backups, Android backups, and Android images.
To get started, display the Passware Kit Start Page and click Mobile
Forensics. This displays the following window:
Android backup files are usually created with an ADB tool from Android SDK
and normally have an *.AB extension.
Passwords for iTunes and Android backup files are recovered using regular
password-recovery attacks. The process can be accelerated with GPU cards and
distributed computing.
Passwords for Android image files are recovered using regular password-
recovery attacks. The process can be accelerated with GPU cards and
distributed computing.
1. On the Start Page click Mobile Forensics, then choose the iCloud
Backup option
2. Enter your iCloud login. Both Apple ID and password should be entered as
shown on the screen below:
Now that you have acquired the iOS backup from iCloud, you are ready to
analyze it with Oxygen Forensic Passware Analyst or open it with Apple iTunes
to see the device data.
Recovering Lost Internet and Network Passwords
You can use the Passware Kit to recover your e-mail account, Internet, and
Network connection passwords.
To get started, display the Passware Kit Start Page, and click Recover
Internet and Network Passwords (or press Ctrl+I). This displays the
following window:
The password recovery process begins. The results are displayed when it is
finished. The figure below shows a sample result.
Recovering Internet Passwords
The Passware Kit can recover passwords associated with websites in browsers
and with Internet Explorer Content Advisor.
The password recovery process begins. The results are displayed when it is
finished. The figure below shows a sample result.
Recovering Network Connection Passwords
The Passware Kit can recover passwords associated with VPN and dialup
accounts as well as remote desktop accounts.
The password recovery process begins. The results are displayed when it is
finished. The figure below shows a sample result.
Resetting a Windows Administrator Password
What do you want to do?
NOTE: Both Windows 32-bit and 64-bit Setup CDs are supported.
NOTE: If you do not have a Windows Setup CD, you can request a
Windows Key .ISO download.
7. The burning process starts. Passware Kit copies the necessary files from
the Windows Setup CD into the ISO image file.
8. After Passware Kit creates a password reset ISO image, it prompts you to
insert a blank CD/DVD disk into the CD-ROM drive so that it could burn the
image on this disk. Insert a blank CD/DVD disk into the CD-ROM drive.
Click OK.
NOTE: To reboot your PC with a USB Flash Drive you may need to set the
following options for the BIOS Setup Utility: after rebooting your PC please
press 'Del' or 'F2' to run BIOS Setup Utility, go to the 'Boot' section and
press 'F6' to move the 'Hard Drive' device up, then press 'Enter' on the
'Hard Drive' option and press 'F6' to move the 'USB Drive' device up. After
all the changes are set, press 'F10' to exit and save the settings.
2. After all the required files are loaded from the CD or USB drive, Windows
Key process starts.
3. Enter the protection password that you have set while creating the
Windows Password Reset CD\USB disk. Click Next. If you have not set any
password, go to the next step.
4. Select the Windows installation to be unlocked. If there are several
installations, use additional information from the table to choose the one
you need to unlock. Click Next.
5. Select the local Windows account or Active Directory Administrator
account for which you want to reset the password. Click Next.
The quickest way to start password extraction from registry files is to click the
Recover Passwords for a Standalone System option on the Start Page, or
press Ctrl+S.
- Windows\system32\config\
To get started, display the Passware Kit Start Page, click Recover Passwords
for a Standalone System (or press Ctrl+S) and locate the system directory
of a standalone computer, as shown below:
Use the Password Recovery Wizard - best for users who know
something about their passwords, but are new to password
recovery.
Run the default attacks - best for users who know nothing about
their passwords.
Use the Attack Editor - best for advanced users and who are
decrypting strong passwords.
This procedure initiates the password recovery process. The results are
displayed when the recovery is complete. The figure below shows a sample
result.
Recovering Internet and Network Passwords for a
Standalone System
You can use Passware Kit to recover saved passwords for email accounts,
websites, network and remote desktop connections of standalone systems from
the user directories copied from these systems.
- Documents and Settings (for Windows XP) or Users (for Windows 7/Vista)
To get started, display the Passware Kit Start Page, click Recover Passwords
for a Standalone System (or press Ctrl+S) and locate the system directory,
as shown below:
2. Click Browse... and locate the Windows User directory, which is usually
named as Documents and Settings.
3. In the Windows Users list select the account you want to recover the
internet and network passwords for.
4. If the account you selected is protected with a Windows login password,
Passware Kit will ask you to choose one of the two options below. If the
account is not password-protected, click Next and continue to step 6.
If you know a Windows login password for this account, switch to the I
know the password option. Type the known password in this field.
If you do not know a Windows login password for this account, switch
to the I don't know the password option. The recovery process for
the Windows login password will be initiated. Once the password is
recovered, type it in the I know the password field and continue to
the next step.
The password recovery process begins. The results are displayed when it is
finished. The figure below shows a sample result.
Recovering Windows/Unix/Mac Hash Passwords
With Passware Kit you can recover passwords from Windows/Unix/Mac hashes.
The following hashing algorithms are supported:
Windows stores local user names and their hashed passwords in a SAM
(Security Account Manager) registry file.
To dump Windows NTLM hashes, you need administrative access to the target
computer.
Once you have logged in as an Administrator, you can use third-party tools
like PWDUMP and FGDUMP to dump the hash file from the system.
NOTE: To recover Windows hash passwords, you can also use the Recover
passwords for a standalone system option. In this case the recovery is
instant and does not require dumping the hash file from the system.
To get started, display the Passware Kit Start Page, then click the Recover
button, or press Ctrl+O.
Choose one of the following options for password recovery, depending on the
available information about the password:
Use the Password Recovery Wizard - best for users who know
something about their passwords, but are new to password
recovery.
Run the default attacks - best for users who know nothing about
their passwords.
Use the Attack Editor - best for advanced users and who are
decrypting strong passwords.
This procedure initiates the password recovery process. The results (i.e., user
account names and login passwords) are displayed when the recovery is
complete. The figure below shows a sample result.
Working with Passware Kit Portable
You can use the Passware Kit to find encrypted files and recover lost passwords
on other computers without installing the software there. The Portable Version
can be installed on any removable device, i.e., a USB drive or a CD (USB
recommended), and then used directly from this device on a target computer.
Passware Kit Portable does not modify settings or files on a target computer
(registry records, patched or unprotected files, etc.).
Choose the folder in which to install the portable version. It can be installed
directly on a removable USB thumb drive. Click OK.
Passware Kit installs its portable version in the specified folder. Once installed,
you can copy this folder onto a CD or USB drive.
Passware Kit Portable is now ready to be used directly from your
removable CD or USB drive.
Running Passware Kit Portable
Once you have prepared the portable CD or USB drive, you are ready to use
Passware Kit Portable on a target computer by following these steps:
NOTE: Passware Kit Portable does not make any changes to the original file
system or registry of the target computer. This means that after encryption
scanning, password recovery, or decryption of files on the target computer, all
items and original passwords remain unaffected. Passware Kit Portable does
not save any log files, reports, or unprotected files on a target computer. All
data is saved on a portable USB drive. It is recommended to run Passware Kit
Portable from a USB drive instead of a CD; otherwise, the program will be
unable to save any data due to writing restrictions on a CD drive.
Using Passware Kit Forensic with EnCase
All Guidance EnCase users can now utilize Passware Kit Forensic to detect
encrypted files in a case. Thanks to integration with Passware Kit Forensic,
EnCase can detect over 200 encrypted file types and initiate a password
recovery process if required.
Requirements:
4. Choose Open With -> Passware Kit. Passware Kit Forensic will be
launched as a File Viewer and the password recovery process will start
automatically.
5. After the file is decrypted or the password is recovered, you can open the
file directly from Passware Kit Forensic.
How-To for EnCase v6
If you are using EnCase v6, you can still use the encryption detection
capabilities of Passware Kit Forensic via EnScript. The sample EnScript
bookmarks all the password-protected or encrypted files for further analysis.
Passware Kit Forensic 10.3 or later is required in this case.
The Select a passwords list window appears. Locate your passwords list file
(TXT) and click Open.
Passware Kit processes your file and reports the result as displayed below:
Now you can see if the current settings are appropriate for your list of
passwords and optimize them if necessary!
Using the Decryptum Portable
Decryptum Portable is a set of rainbow tables that allows instant decryption of
Word and Excel files up to v.2003 with a Rainbow Tables attack. This set of
rainbow tables can be purchased in addition to Passware Kit and is shipped on
a physical USB disk.
The success rate is 99.7% for MS Word files and 95% for MS Excel files.
Decryptum Portable does not support MS Word/Excel files created with MS
Office 2007 or later versions and old files created with MS Office 95 or
prior versions.
Decryptum Portable does not recover the original password; it just
removes it.
Decryptum Portable does not work with Workbook/Worksheet, document
protection, or VBA passwords. It removes only File-Open passwords.
Files protected using additional crypto providers are not supported.
Documents created with restricted permissions using the "Information
Rights Service for Microsoft Office" are not supported.
MS Excel files that contain custom menus are not supported.
NOTE: In all cases above, you can use other regular password recovery
attacks to recover passwords for your files.
Once you have started the Rainbow Tables attack, you need to add the
Rainbow Tables to it.
Adding the Rainbow Tables and Running the
Decryption Process
Once you have started the Rainbow Tables attack, you need to add the
Rainbow Tables to it. Make sure your Decryptum Portable USB disk is
connected and that you run Passware Kit as Administrator.
1. At the Attack Editor window click the Settings button to customize the
attack. This displays the screen shown below:
2. Click the Add button and locate the .RT files (rainbow tables) from the
connected Decryptum Portable USB disk. Click Ctrl+A to select all files as
shown below:
Click OK to add the tables selected.
Once you have added the rainbow tables to the attack, start the decryption
process by clicking the Recover >> button in the bottom right corner of the
Attack Editor window. This launches the decryption process:
The decryption process takes less than one minute for each of the files. The
results (i.e., the decrypted files) are displayed when the decryption is
complete. The figure below shows a sample result.
Password Recovery Details
This section describes the details of password recovery.
File-Open
Password
File Recovery Hardware
Aplication Extension Options Acceleration
Acrobat 3.0 PDF Instant
Recovery /
Brute-force
Recovery - Fast
Acrobat 4.0 PDF Instant
Recovery /
Brute-force
Recovery - Fast
/ Medium
Acrobat 5.0 PDF Instant
Recovery /
Brute-force
Recovery -
Medium
Acrobat 6.0 PDF Instant
Recovery /
Brute-force
Recovery -
Medium
Acrobat 7.0 PDF Instant
Recovery /
Brute-force
Recovery -
Medium
Acrobat 8.0 PDF Instant
Recovery /
Brute-force
Recovery -
Medium
Acrobat 9.0 PDF Instant
Recovery /
Brute-force
Recovery - Fast
/ Medium
Acrobat 10.0 PDF Instant
Recovery /
Brute-force
Recovery -
Slow
Acrobat 11.0 PDF Instant
Recovery /
Brute-force
Recovery -
Slow
Symantec ACT! 2.0 BLB Instant
Recovery
Symantec ACT! 3.0 BLB Instant
Recovery
Symantec ACT! 4.0 BLB Instant
Recovery
Symantec ACT! 2000 BLB Instant
Recovery
ACT! by Sage 2005 ADF Instant
Recovery
ACT! by Sage 2006 ADF Instant
Recovery
ACT! by Sage 2007 ADF Instant
Recovery
ACT! by Sage 2008 ADF Instant
Recovery
ACT! by Sage 2009 ADF Instant
Recovery
Android Backup AB Brute-force X
Recovery -
Slow
Android Image BIN Brute-force X
Recovery -
Slow
Apple Disk Image DMG, DD Brute-force X
Recovery -
Slow
Apple iTunes Backup / iOS PLIST Brute-force X
4.x - 7.x Recovery -
Slow
BestCrypt 6.0 JBC Brute-force
Recovery -
Slow
BestCrypt 7.0 JBC Brute-force
Recovery -
Slow
BestCrypt 8.0 JBC Brute-force
Recovery -
Slow
FileMaker Pro 3.0 FP3 Instant
Recovery
FileMaker Pro 4.0 FP3 Instant
Recovery
FileMaker Pro 5.0 FP5 Instant
Recovery
FileMaker Pro 6.0 FP5 Instant
Removal
FileMaker Pro 7.0 FP7 Instant
Removal
FileMaker Pro 8.x FP7 Instant
Removal
FileMaker Pro 9.0 FP7 Instant
Removal
FileMaker Pro 10.0 FP7 Instant
Removal
FileMaker Pro 11.0 FP7 Instant
Removal
FileMaker Pro 12.0 FMP12, Instant
USR Removal
Google Chrome Website Instant
Recovery
ICQ 2000-2003 DAT Instant
Recovery
ICQ 99a DAT Instant
Recovery
ICQ Lite FB Instant
Recovery
Lotus 1-2-3 1.1+ WK!, WK1, Instant
WK4, Recovery
WRC,
WR1,
WR9, 123
Lotus Notes 4.x ID Brute-force
Recovery -
Medium
Lotus Notes 6.x ID Brute-force
Recovery -
Medium
Lotus Notes 7.0 ID Brute-force
Recovery -
Medium
Lotus Notes 8.0 (RC2 ID Brute-force X
encryption) Recovery -
Medium
Lotus Organizer 1.0 ORG Instant
Recovery
Lotus Organizer 2.0 OR2 Instant
Recovery
Lotus Organizer 3.0 OR3 Instant
Recovery
When using the brute-force method, the Passware Kit tries to recover the
original password by testing all possible combinations. Four attacks are used to
recover the original password: Dictionary, Brute-force, Xieve, and Previous
Passwords. More information about these types of attacks can be found on the
Attack Descriptions page.
Click here to learn more about the password recovery options and complexity
level for each supported file type.
Attack Descriptions
Passware Kit uses eight different password recovery attacks.
Dictionary
Dictionary attack tries thousands of words from dictionary files as possible
passwords.
Password length
Dictionary file
Pattern
If any part of the password is known, enter it in the "Pattern" field. Known
parts can be separated with special masking symbols '*' or '?'. For example,
"*p?e*" will match both "apple" and "pie".
All '?' characters in the pattern are replaced by exactly one letter. I.e. pattern
"never?????" will match "neveragain" and won't match "forever", "nevermore".
'*' character is replaced by zero or more letters. I.e. pattern "never*" will
match "never", "neveragain", "nevermore", etc.
If you need to use symbols '?' or '*', type symbol '\' before them to cancel the
masking. For example, "whyme\?" will match only password "whyme?" and
won't match password "whyme\w".
You can also use unprintable control symbols in your password settings, such
as '\n' (linefeed), '\t' (tab), '\r' (carriage return), and others.
Casing
You can add Casing Modifier to the Dictionary attack to change casing of any
or all letters of the password.
Reverse Password
You can add Reverse Password Modifier to the Dictionary attack to check for
reversed words from the dictionary.
Brute-force
Brute-force Attack finds passwords by checking all possible combinations of
characters from the specified Symbol Set. This is the slowest, but most
thorough, method.
Password length
Language
Passware Kit offers 9 built-in symbol sets for the following languages: Arabic,
Dutch, English, French, German, Italian, Portuguese, Russian, and Spanish.
You can also add special characters to the symbol set in the "Custom
characters" field.
Symbol Set
The Symbol Set can include Uppercase letters, Lowercase letters, Numbers,
Symbols, Spaces, and Custom characters.
Pattern
If any part of the password is known, enter it in the "Pattern" field. Known
parts can be separated with '*' or '?'. For example, "*p?e*" will match both
"apple" and "pie".
All '?' characters in the pattern are replaced by exactly one of the symbols
from the active Symbol Set. I.e. pattern "never?????" will match "neveragain"
and won't match "forever", "nevermore". '*' character is replaced by zero or
more symbols from the active Symbol Set (this number depends on password
length specified). I.e. pattern "never*" will match "never", "neveragain",
"nevermore", etc.
If you need to use symbols '?' or '*', type symbol '\' before them to cancel the
masking. For example, "whyme\?" will match only password "whyme?" and
won't match password "whyme\w".
You can also use unprintable control symbols in your password settings, such
as '\n' (linefeed), '\t' (tab), '\r' (carriage return), and others.
Xieve
Xieve optimization dramatically boosts Brute-force attack speed by skipping
password checks of nonsensical combinations of characters. It uses a large
built-in table of frequences of different combinations of letters.
Password length
Language
Passware Kit offers 9 built-in symbol sets for the following languages: Arabic,
Dutch, English, French, German, Italian, Portuguese, Russian, and Spanish.
You can also add special characters to the symbol set in the "Custom
characters" field.
Symbol Set
The Symbol Set can include Uppercase letters, Lowercase letters, Numbers,
Symbols, Spaces, and Custom characters.
Pattern
If any part of the password is known, enter it in the "Pattern" field. Known
parts can be separated with '*' or '?'. For example, "*p?e*" will match both
"apple" and "pie".
All '?' characters in the pattern are replaced by exactly one of the symbols
from the active Symbol Set. I.e. pattern "never?????" will match "neveragain"
and won't match "forever", "nevermore". '*' character is replaced by zero or
more symbols from the active Symbol Set (this number depends on password
length specified). I.e. pattern "never*" will match "never", "neveragain",
"nevermore", etc.
If you need to use symbols '?' or '*', type symbol '\' before them to cancel the
masking. For example, "whyme\?" will match only password "whyme?" and
won't match password "whyme\w".
You can also use unprintable control symbols in your password settings, such
as '\n' (linefeed), '\t' (tab), '\r' (carriage return), and others.
Xieve level
You can define the level of Xieve optimization by choosing between Low,
Medium and High. With the High level the application checks the most common
combinations of letters only, skipping all the combinations that are not typical
for the language selected.
Known Password/Part
Known Password/Part Attack checks a certain password entered in the "Value"
field. There is no need to open a file in order to check whether a certain
password is correct.
You can also use unprintable control symbols in your password settings, such
as '\n' (linefeed), '\t' (tab), '\r' (carriage return), and others.
This attack can be combined with other attacks using the Join Attacks option.
For example, if you know your password is a word followed by "1980", use Join
Attacks to combine Dictionary attack and Known Password/Part attack with the
value set to "1980".
Previous Passwords
Previous Passwords Attack checks passwords that were previously recovered
by other attacks for other files. It automatically saves all passwords found.
Decryptum
Decryptum Attack instantly decrypts MS Word and Excel files up to v.2003 in
online mode. It connects to the www.decryptum.com server to generate a free
preview or to decrypt files.
You are required to purchase a Decryptum PIN to save the decrypted file. The
partial preview of the file is free.
To acquire the memory image, you can use Passware FireWire Memory
Imager.
Surezip
SureZip attack decrypts Zip archives created with WinZip version 8.0 and
earlier in less than an hour regardless of password used to protect it. At least
5 simultaneously encrypted files are required in order to process the archive.
Archives created with WinZip are supported.
Zip Plaintext
If there is at least one file from a password protected Zip archive available
unencrypted, Zip Plaintext attack instantly decrypts the whole archive,
regardless of the password length. Archives with WinZip standard encryption
are supported. AES-encrypted archives are not supported by Plaintext attack.
Plaintext archive
Please compress the known file with the same version of Zip and then apply it
to the Zip Plaintext attack as a Plaintext archive.
Example: for passwords like "green123", set the following Join Attacks group:
Join Attacks
(Password Length: from 8 to 8)
Dictionary Attack: English
(Password Length: from 5 to 5)
+
Brute-force Attack: English
(Password Length: from 3 to 3
Symbol Set: Numbers)
Password length
The program searches for the password of the total specified length.
Reversed Order
The program also checks passwords from the reversed order of the attacks. For
the previous example, sample passwords are: "123green","123admin",
"000black".
Append Attacks
Append Attacks group runs attacks to check the shortest passwords first, then
runs the same attacks to check increasingly longer passwords.
When Append Attacks group is not enabled, Passware Kit checks all the
passwords of each attack before running the next attack.
Rainbow Tables
Rainbow Tables attack recovers hashed passwords from Windows, MD5,
LANMAN, NTLM, and SHA1 hashes. To calculate a password, it uses a rainbow
table - a precomputed table for reversing cryptographic hash functions.
Rainbow tables are available for download at third-party websites, such as
FreeRainbowTables.com (free) and Rainbow Crack. The attack supports
unpacked non-hybrid .RT tables, .RTI tables converted with rti2rto.exe tool,
and .RTC tables converted with rtc2rt.exe.
The Rainbow Tables attack can also be used to decrypt instantly MS Word and
Excel files up to v.2003. To decrypt the files, the attack requires special
rainbow tables that are available as an additional product by Passware -
Decryptum Portable.
Attack Modifiers
Attack modifiers enable you to further control the password recovery process
by specifying which casing is used, and whether a reverse password should be
used.
Once you have added a modifier, you should then add an attack to this
modifier.
Change Casing Modifier
This modifier specifies how uppercase and lowercase letters are used in your
password. The default is Original. You can add, remove, or change the settings
for a particular attack as required, using the Attack Editor.
Passware Kit automatically detects NVIDIA and ATI cards available for
acceleration on a target computer and uses them to speed up the password
search process. It can use multiple cards simultaneously.
NOTE: The performance of NVIDIA cards depends on the version of the driver
installed. The maximum password recovery speed on NVIDIA cards is achieved
using driver GeForce 327.23. For AMD cards, we recommend using driver
version 13.152 + OpenCL Driver version 10.0.1268.1.
Tableau TACC
Tableau TACC 1441 hardware accelerator helps to speed up the password-
recovery process by up to 25 times. The device is connected to a computer
through a FireWire port. Passware Kit supports multiple TACC hardware
accelerators connected to a single computer for better performance.
Distributed Password Recovery
Passware Kit uses the computing power of multiple computers to achieve the
highest performance. All hardware acceleration methods listed above can be
used in Distributed Password Recovery.
The table below summarizes the accelerated password-recovery speeds for the
most difficult-to-decrypt file types. *
Password Password
Password Recovery Password Recovery
Recovery Speed on Recovery Speed on
Speed on NVIDIA Speed on TACC
Encryption CPU GPU AMD GPU accelerator
File Type / Hashing (p/s) (p/s) (p/s) (p/s)
Android AES-256 / 1,868 24,654 25,565 7,366
Backup SHA-1
Android AES-128 / 9,365 120,661 121,296 34,268
Image SHA-1
Apple AES-256 / 16,691 76,542 69,557 24,913
Disk SHA-1
Image
Apple AES-256 / 1,858 24,488 25,591 6,673
iTunes SHA-1
Backup
Lotus AES-256 / 601 83,642 N/A N/A
Notes ID SHA-1
Mac AES-128 / 51 3,703 4,235 N/A
FileVault2 SHA-256
Mac TripleDes / 18,228 181,765 174,655 48,005
Keychain SHA-1
Mac OS X SHA-512 35 635 515 N/A
10.8 -
10.9
Hash
MS BitLocker / 5 168 N/A N/A
BitLocker SHA-256
MS Office AES-256 / 63 1,108 1,230 N/A
2013 SHA-512
MS Office AES-128 / 699 10,391 10,600 1,922
2010 SHA-1
MS Office CSP / SHA- 1,412 20,912 20,980 3,804
2007 1
PGP SDA CAST / 10,807 424,275 N/A 56,821
Archive SHA-1
PGP Disk AES-256 / 1,900 N/A N/A 15,140
(PGD) SHA-1
PGP AES-256 / 666 31,644 N/A 4,699
Private SHA-1
Keyring
RSA
PGP AES-256 / 502 23,905 N/A 3,572
Private SHA-1
Keyring
DSA
PGP WDE AES-256 / 7,935 301,697 N/A 48,335
SHA-1
PGP Zip CAST / 258 13,285 N/A 1,863
Archive SHA-1
*
Settings: Brute-force attack, password length from 5 to 5 characters, English
lowercase letters, English uppercase letters, numbers.
CPU: Intel Core i5-2400 @ 3.10GHz (4 cores)
GPU: NVIDIA GeForce GTX 680 (Kepler)
GPU: AMD Radeon HD 7850 (Pitcairn)
TACC: Tableau TACC1441.
Distributed Password Recovery
Passware Kit accelerates password recovery using the computing power of
multiple computers to achieve the highest performance.
Features of Distributed Password Recovery
Recovers passwords for 40+ file types that require Brute-force attack
Has linear performance scalability
Uses multiple-core CPUs and nVidia GPUs efficiently to speed up the
password recovery process
Uses Tableau TACC hardware accelerators to speed up the password
recovery process by up to 25 times
Each computer running Passware Kit Agent supports multiple CPUs, GPUs,
and TACC accelerators simultaneously
Uses Dictionary, Brute-force, Xieve, Known Password/Part, Previous
Passwords attacks and any combination of them
Uses Amazon Compute Cloud to accelerate MS Office 2007-2010 password
recovery by up to 20 times without your having to buy expensive
hardware (watch the video guide)
Passware Kit Agent is available for both Windows and Linux systems, 32
and 64 bit.
The overall steps in using the distributed password recovery are as follows:
For instructions on installing and running Passware Kit Agent on Linux, refer
to the README file from the downloaded TAR archive.
Below are the instructions on installing and running Passware Kit Agent for
Windows.
At the Settings tab, you can choose between Auto discovery and
Manual connection to Passware Kit:
In the Auto discovery mode, Passware Kit Agent automatically locates a
running installation of Passware Kit over the network. In the Manual
connection mode, you can specify the name of the computer Passware Kit
is running on.
Now that you have installed Passware Kit Agent, you are ready to recover the
password with Passware Kit.
Running Passware Kit and Recovering the
Password
Once you have installed Passware Kit Agent, you are ready to recover the
password by following these steps:
1. Launch Passware Kit on the server computer and select a file to process. At
the following screen, click the Enable distributed password recovery
checkbox:
4. When the Passware Kit Agent is connected to Passware Kit, it's Settings
tab displays the IP address and port of the Passware Kit Server, and the
Activity tab displays a graph of resources usage:
During the password recovery process, the status of the Agent is
"Connected and busy..."
5. The detailed activity of the Passware Kit and Passware Kit Agents is
displayed in the Log tab:
6. You can adjust the GPU usage during the password recovery process for
efficient performance of your computer by enabling the Use GPU
acceleration only when the user is not active checkbox from the
Tools | Options menu.
Now you can use more computers to recover your password even faster!
Amazon Elastic Compute Cloud
Passware Kit accelerates password recovery using the power of cloud
computing to achieve the highest performance without your having to buy
expensive hardware.
Features of Amazon EC2 Password Recovery
Recovers passwords for MS Office 2007-2010 files that require a Brute-
force attack
Each Amazon EC2 Instance has two NVIDIA Tesla Fermi GPU cards, which
accelerate password recovery by 11 times
Uses Dictionary, Brute-force, Xieve, Known Password/Part, Previous
Passwords attacks and any combination of them
No need to overload computer CPU since the time-consuming password
calculation process is performed remotely
No need to purchase expensive hardware. Pay only for capacity that you
actually use
Now that you have launched the Amazon EC2 Instance, you are ready to
recover the password with Passware Kit.
Running Passware Kit and Recovering the
Password
Once you have launched an Amazon EC2 instance, you are ready to recover
the password by following these steps:
6. Click OK.
7. Click Recover File Password and select a file to process. At the following
screen, choose one of the three options to specify password settings.
We recommend 1 GB RAM. Larger RAM does not make much difference to the
password calculation process.
To accelerate a password recovery process, Passware Kit uses both NVIDIA and
ATI GPU cards, as well as Guidance Tableau TACC accelerator.
NOTE: The performance of NVIDIA cards depends on the version of the driver
installed. The maximum password recovery speed on NVIDIA cards is achieved
using driver GeForce 327.23. For AMD cards, we recommend using driver
version 13.152 + OpenCL Driver version 10.0.1268.1.
1. Select Request Customer Support Online item from the Help menu
2. Enter all applicable information in the form
3. Click the 'Submit request' button
Tips
The Online Customer Support is the fastest way to get support. The form is
specifically designed to gather information necessary to handle customer
inquiries most effectively.
Email csupport@lostpassword.com
Fax +1 (650) 403-0718
Online http://www.LostPassword.com/support
SOFTWARE LICENSE AGREEMENT FOR PASSWARE
SOFTWARE
This Software License Agreement ("SLA") is a legal agreement between you
(either an individual or a single entity) and Passware for the Passware
software product identified above, which includes computer software and may
include associated media, printed materials, and "online" or electronic
documentation ("SOFTWARE PRODUCT"). By installing, copying, or otherwise
using the SOFTWARE PRODUCT, you agree to be bound by the terms of this
SLA. If you do not agree to the terms of this SLA, do not install or use the
SOFTWARE PRODUCT; you may, however, return it to your place of purchase
for a full refund.
SOFTWARE PRODUCT LICENSE
The SOFTWARE PRODUCT is protected by copyright laws and international
copyright treaties, as well as other intellectual property laws and treaties. The
SOFTWARE PRODUCT is licensed, not sold.
1. GRANT OF LICENSE
This SLA grants you the following rights:
Applications Software. You may install and use one copy of the SOFTWARE
PRODUCT, or any prior version for the same operating system, on a single
computer. The primary user of the computer on which the SOFTWARE
PRODUCT is installed may make a second copy for his or her exclusive use on
a portable computer.
Storage/Network Use. You may also store or install a copy of the SOFTWARE
PRODUCT on a storage device, such as a network server, used only to install
or run the SOFTWARE PRODUCT on your other computers over an internal
network; however, you must acquire and dedicate a license for each separate
computer on which the SOFTWARE PRODUCT is installed or run from the
storage device. A license for the SOFTWARE PRODUCT may not be shared or
used concurrently on different computers.
License Pack. If you have acquired this SLA in a Passware License Pack, you
may make the number of additional copies of the computer software portion of
the SOFTWARE PRODUCT accordingly to the number of licenses acquired
(stated in receipt), and you may use each copy in the manner specified above.
You are also entitled to make a corresponding number of secondary copies for
portable computer use as specified above.
Demo. If you have acquired this SLA with Passware SOFTWARE PRODUCT
labeled as demo version of another Passware SOFTWARE PRODUCT, you are
granted unlimited number of SLA's, and you may use unlimited number of
copies in the manner specified above.
2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS
Not for Resale Software. Notwithstanding other sections of this SLA, you may
not resell, or otherwise transfer for value, the SOFTWARE PRODUCT.
Rental. You may not rent, lease, or lend the SOFTWARE PRODUCT.
Support Services. Passware may provide you with support services related to
the SOFTWARE PRODUCT ("Support Services"). Use of Support Services is
governed by the Passware policies and programs described in "online"
documentation, and/or in other Passware-provided materials. Any
supplemental software code provided to you as part of the Support Services
shall be considered part of the SOFTWARE PRODUCT and subject to the terms
and conditions of this SLA. With respect to technical information you provide
to Passware as part of the Support Services, Passware may use such
information for its business purposes, including for product support and
development. Passware will not utilize such technical information in a form
that personally identifies you.
Software Transfer. You may permanently transfer all of your rights under this
SLA, provided you retain no copies, you transfer all of the SOFTWARE
PRODUCT (including all component parts, the media and printed materials, any
upgrades, this SLA, and, if applicable, the Certificate of Authenticity), and the
recipient agrees to the terms of this SLA. If the SOFTWARE PRODUCT is an
upgrade, any transfer must include all prior versions of the SOFTWARE
PRODUCT.
The Passware Kit also includes Encryption Analyzer Professional, which can
find password-protected files on your computer system -- either on a PC, or
over the network.
Key Features
All-in-one password recovery for 180+ file types
Integrated Encryption Analyzer Pro scans computers for password-
protected items
Integrated Search Index Examiner retrieves electronic evidence from a
Windows Desktop Search Database
Resets passwords for Local and Domain Windows Administrators
Instant online decryption of Word/Excel files (up to version 2003)
Multi-core CPUs acceleration
GPU acceleration for MS Office 2007 files
Basic password recovery attacks: Dictionary, Xieve, Brute-force, Known
Password/Part, Previous Passwords
Password modifiers supported (casing, reverse words, etc.)
Combination of attacks for passwords like "strong123password"
Wizard for an easy setup of password recovery attacks
MD5 hash values for forensic reports
Quick Start
Recover file password
Recover Internet and network passwords
Create a Windows password reset disk
Search for protected files
Recover hard drive password
Recovering a One-Dictionary-Word Password
Specifying the Dictionary
If you indicated that the password was one dictionary word, such as
"administrator", "apple", "support", and "laptop", the next screen asks you to
specify the language of the dictionary.
This screen enables you to fine-tune the attack settings, such as specifying a
password length, any known parts, the casing, and whether it can be reversed.
Complete this screen, and click Finish to display the results of the password
recovery process.
NOTE: If you indicated your password was more than one dictionary word, an
intermediate screen appears, asking how long the entire password is, how
many parts there are, and if you know some settings (such as case or known
parts) for each part. After you enter this information, the Dictionary Attack
Settings screen appears for each part.
Recovering a Multiple-Dictionary-Word Password
Specifying the Dictionary
If you indicated that the password was more than one dictionary word, such as
"bigapple", "securepassword", and "mycomputer", the next screen asks you to
specify the language of the dictionary.
The next screen lets you optionally specify a length for the entire password,
and asks you how many words the password contains. You can also indicate
that you know some settings for each part, such as length and casing.
NOTE: If you know the total password length, enable check-box "Set the
password length". Otherwise, the program will set the total password length
based on further information about password parts.
Complete this screen and click Next.
NOTE: If you did not select any of the "I know settings..." checkboxes, there is
no "Next" button - simply click Finish.
If you indicated you know settings for any of the parts of the password, this
screen enables you to fine-tune the attack settings (such as specifying a
password length, any known parts, the casing, and whether it can be reversed)
for each part. There is a separate screen for each part for which you know
settings.
Complete this screen, and click Finish to display the results of the password
recovery process.
Recovering a Password that Combines Dictionary
Words and Letters, Numbers, and Symbols
Specifying the Dictionary
If you indicated that the password combined dictionary words with letters,
numbers, and symbols, such as "weird&123", the next screen asks you to
specify the language of the dictionary.
On this screen, you can inidicate how many dictionary words are in the
password -- one or two.
Select the appropriate choice and click Next.
This screen enables you to optionally enter the length for the entire password.
It also asks you to choose the structure of the password, and to indicate
whether you know settings (such as length or casing) of each part.
NOTE: If you did not select any of the "I know settings..." checkboxes, there is
no "Next" button - simply click Finish.
Specifying the Dictionary Attack Settings
If you indicated you know settings for any of the parts of the password, this
screen enables you to fine-tune the attack settings (such as specifying a
password length, any known parts, the casing, and whether it can be reversed)
for each part. There is a separate screen for each part for which you know
settings.
Complete this screen, and click Finish to display the results of the password
recovery process.
Recovering a Non-Dictionary-Word Password
Specifying the Xieve Attack Settings
Complete this screen and click Finish to display the results of the password
recovery process.
Recovering a Password with an Unknown Format
Specifying the General Password Settings
If you indicated that the password had an "Other" format, such as "qw3er5ty"
and "03101980", the next screen asks you to specify the length of the
password (optional) and the appropriate dictionary.
NOTE: If you know the total password length, enable check-box "Set the
password length". Otherwise, the program will set the total password length
based on further information about password parts.
The next screen asks if part of the password looks like an English word, such
as "softool".
If you indicated that part of the password did resemble a dictionary word, the
next screen lets you specify the structure for this part. (If you said no, it did
not resemble an dictionary word, a different screen appears.
You can also indicate that you know some settings for the various parts of the
password, such as length and casing.
NOTE: If you did not select any of the "I know settings..." checkboxes, there is
no "Next" button - simply click Finish.
If you indicated you know settings for any of the parts of the password, this
screen enables you to fine-tune the attack settings (such as specifying a
password length, any known parts, the casing, and whether it can be reversed)
for each part. There is a separate screen for each part for which you know
settings.
Complete this screen, and click Finish to display the results of the password
recovery process.
If, earlier, you indicated that no part of the password resembled a dictionary
word, the brute-force attack settings screen appears.
Enter any known parts, and select the appropriate symbol set(s) and casing,
and click Finish to display the results of the password recovery process.
Adding an Attack in the Attack Editor
To add an attack to the attack list, first select the attack after which you want
the new attack to appear. Clicking on an attack selects it. Now use one of the
following methods to add an attack:
Double-click on the attack in the Attack Tree in the right -hand pane.
Select the attack by clicking on it, then click the red left-pointing arrow:
Remove an attack
Rearrange Attacks
Use Attack Modifiers
Reset attack settings to their default values
Sort attacks according to duration
Removing an Attack from the Attack List
To remove an attack to the attack list, first select the attack that you want to
remove. Clicking on an attack selects it. Now use one of the following methods
to remove the attack:
Select the attack by clicking on it, then click the Remove button at the top
of the Attack Editor window:
Select the attack by clicking on it, then click the red right-pointing arrow:
Right-click on the attack, then click Remove in the resulting popup menu.
Alternatively, click the down-arrow on the Remove button (at the top of the
window), then click Remove All.
Add an attack
Rearrange Attacks
Use Attack Modifiers
Reset attack settings to their default values
Sort attacks according to duration
Rearranging Attacks in the Attack Editor
You can move the attacks around in the Attack Editor's attack list. You can also
copy one attack to another location in the list.
Moving Attacks in the Attack List
To move an attack, first select the attack you want to move. Now click either
the Move Up or Move Down buttons at the top of the Attack Editor window.
You can also right-click on the attack, then click either Move Up or Move
Down in the resulting popup menu.
A third way to move attacks is by drag-and-drop. Simply select the attack you
want to move, then drag it to its new location in the attack list.
Copying Attacks in the Attack List
To copy an attack from one place in the attack list to another, follow these
steps:
NOTE: If you select Cut instead of Copy in the popup menu, the attack is
moved, not copied.
Add an attack
Remove an attack
Use Attack Modifiers
Reset attack settings to their default values
Sort attacks according to duration
Using Attack Modifiers
You can use attack modifiers to control the casing and reversal of the password
attack.
To add an attack modifier to the attack list, select the modifier in the list in the
right-hand pane, then click the red left-pointing arrow. (Alternatively, simply
double-click the modifier in the list.) The modifier is added to the attack list
after the currently selected attack.
You can also drag-and-drop an attack modifier onto the attack list.
The following figure shows a modifier that has just been added to the attack
list.
Once you have added the attack modifier to the attack list, you must add a
new attack to go with the modifier.
Add an attack
Remove an attack
Rearrange Attacks
Reset attack settings to their default values
Sort attacks according to duration
Resetting the Attack Editor to the Default
Settings
If you want to return the Attack Editor to its default list of attacks, click Reset
to Defaults in the Actions area of the Attack Editor window.
Add an attack
Remove an attack
Rearrange Attacks
Use Attack Modifiers
Sort attacks according to duration
Loading and Saving Attacks in the Attack Editor
You can export the password recovery attacks as an XML file, which can be
recognized by other instances of Passware Kit. Click the Save Attacks link at
the Actions pane and choose the directory to save the XML file. The current
list of password recovery attacks and their settings will be saved on your
computer.
You can import the password recovery attacks from an existing XML file,
created by other instances of Passware Kit. Click the Load Attacks link at the
Actions pane and choose the location of the XML file. The saved list of attacks
and their settings will be loaded for the current password recovery process.
Sorting Attacks in the Attack List
Some attacks take longer than others. To run the attacks in order of duration
from shortest to longest, click the Sort by Duration button at the top of the
Attack Editor window.
Add an attack
Remove an attack
Rearrange Attacks
Use Attack Modifiers
Reset attack settings to their default values
Printing a Report or Log
To print a report or log, follow these steps:
You can also select the type of scan you want to use. A full scan includes
scanning system folders, slow file types, encrypted containers and disk images,
and calculating MD5 values. You can disable these options if you need a less
complete, but much faster scan.
After you have chosen the type of scan and the folders and/or drives to scan,
start the scan by clicking the Start button on the toolbar, which looks like this:
Monitoring Scan Progress
During a scan, Passware Kit keeps you up-to-date as to the progress of the
scan in several ways:
The Scan Progress area at the top of the main window displays a
graphical progress bar, and lists time elapsed and time-to-completion. A
sample Scan Progress area is shown here:
The Status Bar, visible along the bottom of the window, gives a summary
of the number of protected items found and the total number of items
scanned.
The Scan Status area of the window. A sample is shown here:
NOTE: If you want, you can turn off the Status Bar.
NOTE: The default format of the list file is a tab-delimited text file, and the
default name is PFOutputFile.txt. You can also save the file as a comma-
delimited file (.csv) or XML (.xml) file, using the Save as type field of the
Save As dialog box.
CAUTION: If you save more than one scan result, be sure to give each saved
list a unique name.
Accessing and Saving the Scan Log
Passware Kit keeps a detailed log of the files it scans. You can access the log in
two ways:
In the scan log, you can see which files were skipped, the time they were
scanned and other useful information.
NOTE: The default format of the scan log file is a tab-delimited text file, and
the default name is LogOutputFile.txt. You can also save the file as a comma-
delimited file (.csv) or XML (.xml) file, using the Save as type field of the
Save As dialog box.
CAUTION: If you save more than one scan log, be sure to give each saved log
a unique name.
Choosing What to Scan
You can limit your scan to a single drive or folder, or to scan your entire
computer system.
Using the Where to Scan Area to Select Files
Select one of the four options in the Where to Scan area:
If you select Selected Drives and Folders, a list of drives and folders
appears, as shown here:
Use the + icons next to the drives and folders to expand them as necessary;
click each drive or folder you want to scan.
NOTE: Selecting a folder in the list automatically selects all subfolders of that
folder; you can deselect individual subfolders if you want.
NOTE: The settings you choose in the Where to Scan area are saved when
you exit the program, and are in effect the next time you launch the program.
NOTE:You can also drag-and-drop folders into the main window for scanning.
For this type of scan, only the Recommended scan type is used.
Starting the Scan
If you have finished selecting the scan type and what to scan, you are ready to
start the scan by clicking the Start button on the toolbar, which looks like this:
Clicking Status Bar again toggles the Status Bar back on, and a check mark
appears next to the menu selection to indicate the Status Bar is active.
Working with Selected Files in the Scan Results
Once a scan is complete and the scan results appear, you can choose several
actions for selected files.
Selecting a File in the List
To select a single file, click on it in the file list.
To select several files in the file list at once, use SHIFT-click and
Ctrl+click.
To select all files, click Select All in the View menu.
To invert the selection, click Invert Selection in the View menu.
Details for a single selected file, including file name, type, and size, appear in
the Details area, a sample of which is shown here:
If more than one file is selected, the Details section displays how many items
are selected and how much total disk space they occupy.
Now that you have selected the file(s), what do you want to do?
Open a file
Open the folder containing the file
Copy files to another folder
Move files to another folder
Recover password
Customizing the Scan Results Display
You can adjust the information displayed by the scan results with a few mouse
clicks.
3. After all the required files are loaded from the bootable CD/USB, Passware
Kit starts working. It displays your license info.
9. Remove the Passware Kit bootable disk and restart your PC.
Now you are able to log into your computer without a password!
Scanning Files Using Drag-and-Drop
If you prefer, you can drag and drop the files that you want to scan.
1. Resize your application windows so that you can see both Windows
Explorer and Passware Kit on your screen.
2. In Windows Explorer, select the folders you want to scan.
3. Drag them, using the mouse, and release them over the Passware Kit
window.
When you release the files, a dialog box appears, asking if you want to start
the scan for the selected files. Click OK to start the scan, or Cancel.
NOTE: When you drag-and-drop files to scan, the scan type defaults to
Recommended. You cannot run a Fast or Full scan on drag-and-dropped files.
Opening a File
To open a file shown in the scan results file list:
Of course, to open a file, you must know the password that protects the file.
Use the Passware Recover Kit to recover lost passwords.
Opening a Folder from the Scan Results
To open the folder that contains a file selected in the scan results:
This opens a new instance of Windows Explorer, showing the entire contents of
the folder that contains the selected file.
Copying Files from the Scan Results
To copy one or more files shown in the scan results file list to another location:
NOTE: You can use the Make New Folder button in the Browse for Folder
dialog box to create a new folder in which to copy the file(s). The new folder is
named New Folder, and is added to the My Documents folder. Subsequent new
folders are named New Folder (2), and so on.
Moving Files from the Scan Results
To move one or more files shown in the scan results file list to another
location:
NOTE: You can use the Make New Folder button in the Browse for Folder
dialog box to create a new folder in which to copy the file(s). The new folder is
named New Folder, and is added to the My Documents folder. Subsequent new
folders are named New Folder (2), and so on.
Hiding Selected Files in the Scan Results
After you have selected one or more files in the scan results, you can hide
those files by clicking Hide Selected Files in the File menu. These files no
longer appear in the current file list.
CAUTION: Once you hide files from the file list, you cannot redisplay them.
Use this feature with care.
Rearranging and Sorting Files in the Scan Results
By default, the files in the scan results are arranged in alphabetical order by
the folder in which they were found during the scan. After the scan is
complete, you can rearrange and sort the list.
Rearranging the List
Rearrange the list by clicking Arrange By in the View menu. Several choices
are offered in the submenu:
Name
Protection Level
Folder
Size
Date
Sorting the List
By default, the list is sorted in ascending alphabetical order by folder. You can
change the sort order by clicking on a column name in the scan results, such
as File Name, Folder, Unprotection, File Type, or Document Type.
Once you have created the password reset ISO image, follow these steps to
burn it on a CD:
Click Next.
2. The following screen appears:
Select CD/DVD and specify the CD burning drive from the pull-down list.
Insert a blank CD/DVD disk into the CD-ROM drive. Click Next.
3. The burning process starts.
Passware Password Recovery Kit extracts the ISO image and copies the
necessary files on a CD.