Break complex passwords, recover strong encryption keys and unlock documents in a production environment. Elcomsoft Distributed Password Recovery is a high-end solution for forensic and government agencies, data recovery and password recovery services and corporate users with multiple networked workstations connected over a LAN or the Internet. Featuring unique acceleration technologies and providing linear scalability with no overhead, Elcomsoft Distributed Password Recovery offers the fastest password recovery by a huge margin, and is the most technologically advanced password recovery product currently available.
Elcomsoft Distributed Password Recovery employs a revolutionary, patented technology to accelerate password recovery when a compatible NVIDIA or AMD graphics card is present in addition to the CPU-only mode. Hardware acceleration utilizes GPU cores of NVIDIA GeForce boards, AMD GPUs, as well as GPU cores built into Intel CPUs including Intel HD Graphics, UHD Graphics and Intel Iris.
The acceleration technology offloads parts of computational-heavy processing onto the fast and highly scalable processors featured in the latest graphic accelerators, achieving unprecedented recovery speeds exceeding those available to CPU-only users by significant margin.
ElcomSoft pioneered asynchronous hardware acceleration. Heterogeneous acceleration allows using multiple video cards of different makes and models, effectively utilizing existing hardware and squeezing the last bit of performance out of every supported component.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords.
|Application family||Applications||Extensions||Type of recovery||Password types||Hardware Acceleration|
|ZIP archives||PKZip, WinZip||.ZIP, .EXE||password||file opening password||NVIDIA|
|ZIP archives||WinZip (AES)||.ZIPX. .EXE||password||file opening password||NVIDIA|
|Bitcoin Wallet||Bitcoin Core||wallet.dat||password||-||NVIDIA|
|7zip archives||7Zip||.7z, .7z.001, .EXE||password||file opening password||NVIDIA, AMD, Intel|
|RAR archives||RAR/WinRAR 3/4/5||.RAR||password||file opening password||NVIDIA|
|Microsoft Office 2007||Word, Excel, PowerPoint, Project||.DOCX, .XLSX, .PPTX, .MSPX||password||file opening password||NVIDIA, AMD, INTEL|
|Microsoft Office 2007||Access||.ACCDB||password||file opening password||-|
|Microsoft Office 2010||Word, Excel, Access, PowerPoint, OneNote||.DOCX, .XLSX, .ACCDB, .PPTX, .ONE||password||file opening password||NVIDIA, AMD, INTEL|
|Microsoft Office 2013, 2016, 2019||Word, Excel, Access, PowerPoint, OneNote||.DOCX, .XLSX, .ACCDB, .PPTX, .ONE||password||file opening password||NVIDIA, AMD, INTEL|
|Microsoft Office XP/2003||Word, Excel, PowerPoint||.DOC, .XLS, .PPT||password||"open" password only||-|
|Microsoft Office 97/2000||Word, Excel||.DOC, .XLS||password||"open" password only||-|
|Microsoft Office 97/2000||Word, Excel||.DOC, .XLS||key||"open" password only - guaranteed decryption||-|
|-||Microsoft SQL Server||.MDF||password||-||NVIDIA, AMD, INTEL|
|-||Microsoft SQL Server Compact||.SDF||password||-||NVIDIA, AMD, INTEL|
|OpenDocument (OpenOffice, StarOffice etc)||word processing (text) documents||.ODT, .OTT, .SXW, .STW||password||-||NVIDIA, AMD, INTEL|
|OpenDocument||spreadsheets||.ODS, .OTS, .SXC, .STC||password||-||NVIDIA, AMD, INTEL|
|OpenDocument||presentations||.ODP, .OTP, .SXI, .STI||password||-||NVIDIA, AMD, INTEL|
|OpenDocument||graphics/drawing||.ODG, .OTG, .SXD, .STD||password||-||NVIDIA, AMD, INTEL|
|OpenDocument||formulae, mathematical equations||.ODF, .SXM||password||-||NVIDIA, AMD, INTEL|
|Hangul/Hancom Office 2010||Hanword||.HWP||password||-||-|
|Hangul/Hancom Office 2014||Hanword||.HWP||password||-||-|
|Hangul/Hancom Office 2010||Hancell||.CELL||password||-||NVIDIA, AMD, INTEL|
|Hangul/Hancom Office 2014||Hancell||.CELL||password||-||NVIDIA, AMD, INTEL|
|PGP and Open-Key Passwords||PGP zip archives||.PGP||password||-||NVIDIA|
|PGP and Open-Key Passwords||PGP secret key rings||.SKR||password||-||NVIDIA|
|PGP and Open-Key Passwords||PGP disks with conventional encryption||.PGD||password||-||NVIDIA|
|PGP and Open-Key Passwords||PGP self-decrypting archives||.EXE||password||-||-|
|PGP and Open-Key Passwords||PGP whole disk encryption||-||password||-||NVIDIA|
|PGP and Open-Key Passwords||Personal Information Exchange certificates - PKCS #12||.PFX, .P12||password||-||NVIDIA|
|IKE||Internet Key Exchange (IKE) passwords||-||password||-||NVIDIA, AMD, INTEL|
|TrueCrypt, VeraCrypt||TrueCrypt and VeraCrypt disk encryption||-||password||-||NVIDIA|
|TrueCrypt, VeraCrypt||TrueCrypt and VeraCrypt encrypted containers||-||password||-||NVIDIA|
|BitLocker||BitLocker and BitLocker To Go disk encryption||-||password||-||NVIDIA, AMD|
|FileVault 2||HFS/HFS+ and APFS full-disk encryption||-||password||-||NVIDIA, AMD|
|LUKS||LUKS disks and containers||-||password||plaintext passwords||NVIDIA|
|-||MD5 hashes||-||password||plaintext passwords||NVIDIA|
|-||Salted MD5 hashes||-||password||plaintext passwords||NVIDIA|
|-||SHA-1||-||password||plaintext passwords||NVIDIA, AMD, INTEL|
|-||SHA-256||-||password||plaintext passwords||NVIDIA, AMD, INTEL|
|-||SHA-512||-||password||plaintext passwords||NVIDIA, AMD, INTEL|
|Adobe Acrobat PDF X/XI/DC||PDF with 256-bit encryption||password||"user" and "owner" password||-|
|Adobe Acrobat PDF 9.x||PDF with 256-bit encryption||password||"user" and "owner" password||NVIDIA, AMD|
|Adobe Acrobat PDF 5-8||PDF with 128-bit encryption||password||"user" and "owner" password||NVIDIA, AMD|
|Adobe Acrobat PDF||PDF with 40-bit encryption||password||"user" and "owner" password||-|
|Adobe Acrobat PDF||PDF with 40-bit encryption||key||"user" password - guaranteed decryption||-|
|System Passwords||Microsoft Windows NT, 2000, XP, 2003, Vista||-||password||logon passwords (LM/NTLM)||NVIDIA|
|System Passwords||Microsoft Windows||-||password||SYSKEY startup passwords||-|
|System Passwords||Microsoft Windows||-||password||DCC (Domain Cached Credentials) passwords||NVIDIA, AMD, INTEL|
|System Passwords||UNIX||-||password||users’ passwords||-|
|System Passwords||Mac OS X||login.keychain||password||keychain password||NVIDIA|
|System Passwords||Mac OS X||-||password||user’s passwords||NVIDIA|
|-||Mac OS X||FileVault||password||master password||NVIDIA|
|-||Mac OS X||DMG||password||master passwords||NVIDIA|
|Password managers||KeePass||.KBDX, .KBD, .PWD||password||master password||NVIDIA, AMD, INTEL|
|Password managers||KeePass (RDBX4)||.KBDX||password||master password||-|
|Password managers||1Password||Windows / macOS / Android / iOS; backups on Dropbox and iCloud Drive||password||master password||NVIDIA, AMD, INTEL|
|Password managers||LastPass||Windows, macOS and Linux browser plug-ins, Android app||password||master password||NVIDIA, AMD, INTEL|
|Password managers||Dashlane||Windows, macOS||password||master password||NVIDIA, AMD, INTEL|
|System Passwords||Wireless networks||-||password||WPA and WPA2 passwords||NVIDIA, AMD, INTEL, AVX2|
|-||Lotus Notes (RC2)||.ID||password||-||-|
|-||Lotus Notes (AES)||.ID||password||-||NVIDIA, AMD, INTEL|
|-||TheBat!||.TBK||password||passwords to backups||-|
|-||Mozilla, FireFox, Thunderbird||-||password||master passwords||-|
|iPhone/iPod/iPad backup||iTunes||-||password||-||NVIDIA, AMD|
|BlackBerry backup||BlackBerry Desktop Software (old)||.IPD, .BBB||password||-||AES-NI|
|BlackBerry backup||BlackBerry Desktop Software (6.0+ for Windows, 2.0+ for Mac)||-||password||-||NVIDIA, AMD|
|Apple iWork '09||Pages, Numbers, Keynote||.pages, .numbers, .key||password||password to open||NVIDIA, AMD, INTEL|
|Apple iWork 2013/2014||Pages, Numbers, Keynote||.pages, .numbers, .key||password||password to open||NVIDIA, AMD, INTEL|
|Tally Vault||Tally ERP 9||.900||password||password to open||-|
|Windows Easy Transfer||Windows Easy Transfer||.mig||password||HMAC(sha1) + 3DES-CBC||-|
|Parallels||Parallels virtual machines||config.pvs||password||password to open||-|
|VirtualBox||VirtualBox virtual machines||.vbox||password||password to open||NVIDIA, AMD|
|VMware||VMware virtual machines||.vmx||password||password to open||NVIDIA, AMD|
Important note: hardware acceleration (for specific file formats and algorithms only, see the above chart for details) works properly only on Windows Server 2003/2008/2012 and Windows 7/8/8.1/10 (32-bit or 64-bit); specific versions of NVIDIA/AMD drivers are required; some other restrictions apply (e.g. for some file formats, it is implemented for brute-force attack only, while dictionary attack only works on the CPU, regardless the settings).
Unlike competition, Elcomsoft Distributed Password Recovery is not ‘virtually’ or ‘practically’ linear in scalability. By doubling the number of PCs working on a password, you cut the time required to recover a password by half.
By only transferring the bare minimum of information over the network, Elcomsoft Distributed Password Recovery allows for massively parallel operation, and scales linearly to as many as 10,000 workstations with no scalability overhead.
Elcomsoft Distributed Password Recovery enables distributed work over the LAN, Internet, or both. Minimum bandwidth requirements ensure no scalability overhead even for the slowest connections.
The convenient management console allows controlling Elcomsoft Distributed Password Recovery from any networked PC.
Users can quickly deliver additional computing power on demand by utilizing Amazon’s GPU-accelerating EC2 Compute Units and Microsoft Azure instances. Depending on performance requirements and budget constraints, Amazon EC2 or Microsoft Azure instances can quickly scale to speed up the job, and can be scaled back when not in use. Elcomsoft Distributed Password Recovery running in an Amazon cloud is a perfect solution when additional computational power is needed without the need to invest into building permanent infrastructure in-house.
With Elcomsoft Distributed Password Recovery supporting cloud compute instances, users can get as much speed as they need the moment they need. Support for additional cloud services is coming soon.
The use of virtual machines is on the rise, enabling criminals cover their activities under a virtual umbrella. While storing massive amounts of evidence, an encrypted virtual machine can greatly reduce the risks of an accidental leak of incriminating evidence. Elcomsoft Distributed Password Recovery helps investigators gain access to all of that evidence by breaking the original encryption password.
Three of the most popular virtual machines are supported: VMware, Parallels, and VirtualBox. The tool can attack and recover the original VM encryption passwords, helping investigators to gain access stored in encrypted images.
The included Elcomsoft Hash Extractor tool allows extracting encryption metadata from a wide range of file formats. By using encryption metadata to set up attacks, you are automatically ensuring that, in a case of a breach, absolutely no raw or encrypted data falls into the wrong hands as none is included in the extracted hash files.
Elcomsoft Hash Extractor enables to set up attacks on a tiny hash file instead of the original, potentially large file or document. Since no raw or encrypted data is included in encryption metadata, the hash files produced with Elcomsoft Hash Extractor offer significantly higher level of privacy, allowing remote and cloud processing without the risk of a content leak.
The optional portable version of this tool allows for better portability and flexibility, offering significantly easier extraction of password and encryption hashes from live systems.
Elcomsoft Hash Extractor now supports Microsoft Office, Open Document, Apple iWork, and Adobe Acrobat documents.
Using brute force attack to recover passwords, it is possible, though time-consuming, to recover passwords from popular applications with the power of the computer’s main CPU. However, the computational power of a general purpose CPU is no longer sufficient to break into many types of data protected with modern encryption methods. Manufacturers utilize tens of thousands of iterations to intentionally slow down the recovery, making the job effectively impossible for all but the simplest passwords.
Elcomsoft Distributed Password Recovery utilizes dedicated high-performance cores found in today's video cards such as those manufactured by NVIDIA and AMD to offload parts of computational-intensive calculations onto the highly scalable video cards. Featuring several hundred GPU cores, a single video card can deliver the speed far exceeding the metrics of a high-end CPU. Elcomsoft Distributed Password Recovery uses thoroughly optimized algorithms, reaching recovery rates that are up to 250 times faster compared to CPU-only benchmarks.
Today's PC motherboards support multiple video cards. Thanks to ElcomSoft's proprietary heterogeneous computing, Elcomsoft Distributed Password Recovery supports a mix of up to 32 video cards even if they are of different makes and models, allowing for even faster password recovery applications for a modest increase in hardware costs. The tool allows mixing NVIDIA and AMD boards of different generations in a single PC.
For more details, see GPU Acceleration Frequently Asked Questions.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords and much more.
Microsoft Office Documents
OpenDocument (OpenOffice, StarOffice etc) (GPU accelerated)
Apple iWork (GPU accelerated)
Hangul/Hancom Office (Hanword, Hancell)
Disk encryption and Open-Key Passwords
Adobe Acrobat PDF
Other Passwords and Hashes
Elcomsoft Distributed Password Recovery is licensed based on the number of instances (agents). We accept all major credit cards, checks, bank transfers and purchase orders. Sales taxes may be added to your order according to your jurisdiction. Credit card orders are processed immediately. Electronic licenses are generally available instantly after the credit card charge is approved. On rare occasions where we must manually verify your order, the license will be available in 48 hours or less.
AES-NI and AVX2 are the new instruction set available in some modern CPUs.