
{"id":17592,"date":"2020-05-07T20:56:26","date_gmt":"2020-05-07T19:56:26","guid":{"rendered":"https:\/\/www.trucnet.com\/?p=17592"},"modified":"2020-05-07T20:56:26","modified_gmt":"2020-05-07T19:56:26","slug":"elcomsoft-forensic-disk-decryptor","status":"publish","type":"post","link":"https:\/\/www.trucnet.com\/en\/elcomsoft-forensic-disk-decryptor\/","title":{"rendered":"Elcomsoft Forensic Disk Decryptor 2.11.751"},"content":{"rendered":"<p>Elcomsoft Forensic Disk Decryptor software allows you to decrypt data from encrypted containers or create encrypted folders. The software scans the PC and its data to extract cryptographic keys from RAM captures, hibernation, and page files, and uses plaintext passwords to decrypt files and folders stored in encrypted containers or mounted encrypted drives. It supports BitLocker, BitLocker To Go, FileVault 2, PGP, and TrueCrypt volumes.<\/p>\n<p>Elcomsoft Forensic Disk Decryptor offers all available methods for accessing information stored on BitLocker, FileVault 2, PGP, TrueCrypt, and VeraCrypt encrypted disks and volumes. The toolkit allows the use of plaintext passwords, volume registration or recovery keys, and binary keys extracted from the computer&#039;s memory image or hibernation file. FileVault 2 recovery keys can be extracted from iCloud using Elcomsoft Phone Breaker, while BitLocker recovery keys are available in Active Directory or the user&#039;s Microsoft account.<\/p>\n<p><strong>Full decryption, instant editing, or attack<\/strong><br \/>\nWith fully automatic detection of encrypted volumes and encryption settings, experts only need to provide the path to the encrypted container or disk image. Elcomsoft Forensic Disk Decryptor will automatically search for, identify, and display encrypted volumes and details of their corresponding encryption settings.<\/p>\n<p><strong>Real-time access to encrypted information<\/strong><br \/>\nIn real-time mode, Elcomsoft Forensic Disk Decryptor mounts the encrypted volume as a new drive letter on the investigator&#039;s PC. In this mode, forensic specialists gain fast, real-time access to protected information. Information read from mounted disks and volumes is decrypted on the fly in real time.<\/p>\n<p><strong>No decryption key and no recovery key?<\/strong><br \/>\nIf neither the decryption key nor the recovery key is available, Elcomsoft Forensic Disk Decryptor will extract the metadata needed to brute-force the password with Elcomsoft Distributed Password Recovery.<\/p>\n<p><strong>Support EnCase .E01 and portable version<\/strong><br \/>\nElcomsoft Forensic Disk Decryptor 2.0 now fully supports standard .EO1 EnCase images, as well as encrypted DMG images. Furthermore, Elcomsoft Forensic Disk Decryptor can be used to create a portable installation on a USB flash drive.<\/p>\n<hr \/>\n<p><strong><span style=\"color: #008080;\">Version :<\/span><\/strong> 2.11.751<br \/>\n<strong><span style=\"color: #008080;\">Language :<\/span><\/strong> English<br \/>\n<strong><span style=\"color: #008080;\">Size :<\/span><\/strong> 40.64 MB<br \/>\n<span style=\"color: #008000;\"><strong>Configuration:<\/strong><\/span><br \/>\n\u2013 Windows (x32\/x64 Bits): 7, 8, 8.1, 10<\/p>\n<hr \/>\n<p><strong>Elcomsoft Forensic Disk Decryptor 2.11.751<\/strong><\/p>\n<p><a href=\"https:\/\/trucnet.net\/6lETb\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Uptobox server<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/trucnet.net\/HfHyb\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Server 1File<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/trucnet.net\/xQFWs\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Uploaded Server<\/small><\/span><\/a><\/p>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-caret su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Elcomsoft Forensic Disk Decryptor 2.10 567<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\nUptobox:<br \/>\nhttps:\/\/trucnet.net\/oD9nM<br \/>\n1File:<br \/>\nhttps:\/\/trucnet.net\/WTjTv<br \/>\nUploaded:<br \/>\nhttps:\/\/trucnet.net\/lFv7i\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Le logiciel Elcomsoft Forensic Disk Decryptor vous permet de d\u00e9crypter les donn\u00e9es des conteneurs crypt\u00e9s ou cr\u00e9e des dossiers crypt\u00e9s. Le logiciel il va analyser le PC et ses donn\u00e9es pour extraire les cl\u00e9s cryptographiques des captures RAM, de l\u2019hibernation et des fichiers de page, et utilise les mots de passe en texte brut pour [&hellip;]<\/p>","protected":false},"author":1,"featured_media":17594,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1752],"tags":[7721,7720,7723,7722],"class_list":["post-17592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-logiciels","category-utilitaires","tag-cree-des-dossiers-cryptes","tag-decrypter-bitlocker","tag-disk-decryptor","tag-mots-de-passe-bitlocker"],"aioseo_notices":[],"modified_by":"Auteur","_links":{"self":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/17592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/comments?post=17592"}],"version-history":[{"count":0,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/17592\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media\/17594"}],"wp:attachment":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media?parent=17592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/categories?post=17592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/tags?post=17592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}