Password Recovery Solutions from TDRCBD
Password recovery is the process of identifying a lost, destroyed, or otherwise inaccessible password, allowing for the successful decryption of key files. This can be a crucial service to consider when you’ve lost important databases, spreadsheets, documents, and other files due to encryption.
What Factors Influence Password Recovery Efforts?
The main factors that influence password recovery include:
Password Length
Encryption Type
Size of Encrypted Files
Location of Encrypted Files
List of supported formats for password recovery services:
1Password, agilekeychain
1Password, cloudkeychain
3DES (PT = $salt, key = $pass)
7-Zip
AIX {smd5}
AIX {ssha1}
AIX {ssha256}
AIX {ssha512}
Android FDE (Samsung DEK)
Android FDE <= 4.3
Apache MD5-APR
Atlassian (PBKDF2-HMAC-SHA1)
AxCrypt
AxCrypt in-memory SHA1
bcrypt
Bitcoin/Litecoin wallet.dat
Blockchain, My Wallet
bsdicrypt
Cisco $8$ (PBKDF2-SHA256)
Cisco $9$ (scrypt)
Cisco-ASA MD5
Cisco-IOS $1$ (MD5)
Cisco-IOS type 4 (SHA256)
Cisco-PIX MD5
Citrix NetScaler
ColdFusion 10+
CRAM-MD5
CRC32
DES (PT = $salt, key = $pass)
descrypt
Django (PBKDF2-SHA256)
Django (SHA-1)
DNSSEC (NSEC3)
Domain Cached Credentials (DCC), MS Cache
Domain Cached Credentials 2 (DCC2), MS Cache 2
Drupal 7
eCryptfs
Episerver
FileZilla Server
Fortigate (FortiOS)
GOST R 34.11-2012 (Streebog) 256-bit
GOST R 34.11-2012 (Streebog) 512-bit
GOST R 34.11-94
GRUB 2
Half MD5 (left, mid, right)
HMAC-MD5 (key = $pass)
HMAC-MD5 (key = $salt)
HMAC-SHA1 (key = $pass)
HMAC-SHA1 (key = $salt)
HMAC-SHA256 (key = $pass)
HMAC-SHA256 (key = $salt)
HMAC-SHA512 (key = $pass)
HMAC-SHA512 (key = $salt)
hMailServer
IKE-PSK
IPB (Invision Power Board)
IPMI2 RAKP
iSCSI CHAP
iTunes backup < 10.0
iTunes backup >= 10.0
Joomla
Juniper IVE
Juniper NetScreen/SSG (ScreenOS)
Juniper/NetBSD sha1crypt
KeePass 1 (AES/Twofish) and KeePass 2 (AES)
Kerberos 5 AS-REQ Pre-Auth etype 23
Kerberos 5 TGS-REP etype 23
LastPass
LM
Lotus Notes/Domino 5
Lotus Notes/Domino 6
Lotus Notes/Domino 8
LUKS
MD4
MD5
md5($pass.$salt)
md5($salt.$pass.$salt)
md5($salt.$pass)
md5($salt.md5($pass.$salt))
md5($salt.md5($pass))
md5($salt.md5($salt.$pass))
md5($salt.unicode($pass))
md5(md5($pass).md5($salt))
md5(md5($pass))
md5(sha1($pass))
md5(strtoupper(md5($pass)))
md5(unicode($pass).$salt)
md5crypt
MediaWiki B type
MS Office <= 2003 MD5
MS Office <= 2003 SHA1
MS Office 2007
MS Office 2010
MS Office 2013
MS-AzureSync PBKDF2-HMAC-SHA256
MSSQL
MyBB
MySQL
MySQL CRAM (SHA1)
NetNTLMv1
NetNTLMv1+ESS
NetNTLMv2
Netscape LDAP SHA/SSHA
NTLM
OpenCart
Oracle H: Type (Oracle 7+)
Oracle S: Type (Oracle 11+)
Oracle T: Type (Oracle 12+)
osCommerce
OSX v10.10
OSX v10.4
OSX v10.5
OSX v10.6
OSX v10.7
OSX v10.8
OSX v10.9
Password Safe v2
Password Safe v3
PBKDF2-HMAC-MD5
PBKDF2-HMAC-SHA1
PBKDF2-HMAC-SHA256
PBKDF2-HMAC-SHA512
PDF 1.1 – 1.3 (Acrobat 2 – 4)
PDF 1.4 – 1.6 (Acrobat 5 – 8)
PDF 1.7 Level 3 (Acrobat 9)
PDF 1.7 Level 8 (Acrobat 10 – 11)
PeopleSoft
PeopleSoft PS_TOKEN
phpBB3
PHPS
Plaintext
PostgreSQL
PostgreSQL CRAM (MD5)
PrestaShop
PunBB
RACF
Radmin2
RAR3-hp
RAR5
Redmine
RIPEMD-160
Samsung Android Password/PIN
SAP CODVN B (BCODE)
SAP CODVN F/G (PASSCODE)
SAP CODVN H (PWDSALTEDHASH) iSSHA-1
scrypt
SHA-224
SHA-256
SHA-3 (Keccak)
SHA-384
SHA-512
SHA1
sha1($pass.$salt)
sha1($salt.$pass.$salt)
sha1($salt.$pass)
sha1($salt.sha1($pass))
sha1($salt.unicode($pass))
sha1(CX)
SIP digest authentication (MD5)
SipHash
Skip32
Skype
SMF (Simple Machines Forum)
Sybase
TrueCrypt
vBulletin
VeraCrypt
WBB (Woltlab Burning Board)
Whirlpool
Windows Phone 8+ PIN/password
WinZip
WordPress
WPA
WPA2
xt:Commerce