Password Recovery Solutions from Datarecovery.com

Password recovery is the process of identifying a lost, destroyed, or otherwise inaccessible password, allowing for the successful decryption of key files. This can be a crucial service to consider when you’ve lost important databases, spreadsheets, documents, and other files due to encryption.

As a leader in cryptography solutions, Datarecovery.com offers experienced password recovery for all types of computer systems. Within days, we can restore missing passwords or decrypt files completely, returning mission-critical systems to their original state.

With superior security and state-of-the-art technology, we provide the resources you need to get files back up and running. Read below for more information or call 1.800.237.4200 to speak with a password recovery engineer.

Methods Used for Password Recovery Services

When data is inaccessible due to a lost or intentionally hidden password, several recovery options exist.

In many instances, password recovery engineers can refine standard heuristical rules to run through likely solutions or use parts of remembered passwords to construct a more effective model. This is completed via a detailed audit, which identifies likely components of the password (and just as importantly, unlikely components of the password).

When a program uses hashing to store a password, additional options may exist. In encryption, hashing is a security method that condenses a message into a fixed-length value, and it’s commonly used to store passwords. Hashed passwords are difficult to obtain, but certain hashing methods can be reversed by trained engineers. Specialized hardware allows our team to input anywhere from 10,000 to 40 trillion hashes per second.

Datarecovery.com’s experts have a working knowledge of various encryption and hashing technologies and can complete specialized audits to optimize the chances of a successful effort.

We can help you determine the best solution for your case by evaluating the methods used to secure the data. Throughout the process, we use verified security controls to keep your data from falling into the wrong hands, ensuring that unauthorized parties never gain access to your files or the recovered passwords.

What Factors Influence Password Recovery Efforts?

The main factors that influence password recovery include:

  • Password Length
  • Encryption Type
  • Size of Encrypted Files
  • Location of Encrypted Files

When setting up your case, our engineers will help you understand whether your passwords are likely recoverable, how long the recovery will take, and an estimated price. While most password recoveries are successful, each case is unique and deserves dedicated attention from a qualified team of cryptography experts.

A partial list of supported formats below. Please note that we constantly update our capabilities, and if your file/encryption type is not listed below, it may still be supported. To get started, call us immediately at 1.800.237.4200 or click the button below to start your recovery.

 

List of supported formats for password recovery services:

1Password, agilekeychain
1Password, cloudkeychain
3DES (PT = $salt, key = $pass)
7-Zip
AIX {smd5}
AIX {ssha1}
AIX {ssha256}
AIX {ssha512}
Android FDE (Samsung DEK)
Android FDE <= 4.3
Apache MD5-APR
Atlassian (PBKDF2-HMAC-SHA1)
AxCrypt
AxCrypt in-memory SHA1
bcrypt
Bitcoin/Litecoin wallet.dat
Blockchain, My Wallet
bsdicrypt
Cisco $8$ (PBKDF2-SHA256)
Cisco $9$ (scrypt)
Cisco-ASA MD5
Cisco-IOS $1$ (MD5)
Cisco-IOS type 4 (SHA256)
Cisco-PIX MD5
Citrix NetScaler
ColdFusion 10+
CRAM-MD5
CRC32
DES (PT = $salt, key = $pass)
descrypt
Django (PBKDF2-SHA256)
Django (SHA-1)
DNSSEC (NSEC3)
Domain Cached Credentials (DCC), MS Cache
Domain Cached Credentials 2 (DCC2), MS Cache 2
Drupal 7
eCryptfs
Episerver
FileZilla Server
Fortigate (FortiOS)
GOST R 34.11-2012 (Streebog) 256-bit
GOST R 34.11-2012 (Streebog) 512-bit
GOST R 34.11-94
GRUB 2
Half MD5 (left, mid, right)
HMAC-MD5 (key = $pass)
HMAC-MD5 (key = $salt)
HMAC-SHA1 (key = $pass)
HMAC-SHA1 (key = $salt)
HMAC-SHA256 (key = $pass)
HMAC-SHA256 (key = $salt)
HMAC-SHA512 (key = $pass)
HMAC-SHA512 (key = $salt)
hMailServer
IKE-PSK
IPB (Invision Power Board)
IPMI2 RAKP
iSCSI CHAP
iTunes backup < 10.0
iTunes backup >= 10.0
Joomla
Juniper IVE
Juniper NetScreen/SSG (ScreenOS)
Juniper/NetBSD sha1crypt
KeePass 1 (AES/Twofish) and KeePass 2 (AES)
Kerberos 5 AS-REQ Pre-Auth etype 23
Kerberos 5 TGS-REP etype 23
LastPass
LM
Lotus Notes/Domino 5
Lotus Notes/Domino 6
Lotus Notes/Domino 8
LUKS
MD4
MD5
md5($pass.$salt)
md5($salt.$pass.$salt)
md5($salt.$pass)
md5($salt.md5($pass.$salt))
md5($salt.md5($pass))
md5($salt.md5($salt.$pass))
md5($salt.unicode($pass))
md5(md5($pass).md5($salt))
md5(md5($pass))
md5(sha1($pass))
md5(strtoupper(md5($pass)))
md5(unicode($pass).$salt)
md5crypt
MediaWiki B type
MS Office <= 2003 MD5
MS Office <= 2003 SHA1
MS Office 2007
MS Office 2010
MS Office 2013
MS-AzureSync PBKDF2-HMAC-SHA256
MSSQL
MyBB
MySQL
MySQL CRAM (SHA1)
NetNTLMv1
NetNTLMv1+ESS
NetNTLMv2
Netscape LDAP SHA/SSHA
NTLM
OpenCart
Oracle H: Type (Oracle 7+)
Oracle S: Type (Oracle 11+)
Oracle T: Type (Oracle 12+)
osCommerce
OSX v10.10
OSX v10.4
OSX v10.5
OSX v10.6
OSX v10.7
OSX v10.8
OSX v10.9
Password Safe v2
Password Safe v3
PBKDF2-HMAC-MD5
PBKDF2-HMAC-SHA1
PBKDF2-HMAC-SHA256
PBKDF2-HMAC-SHA512
PDF 1.1 – 1.3 (Acrobat 2 – 4)
PDF 1.4 – 1.6 (Acrobat 5 – 8)
PDF 1.7 Level 3 (Acrobat 9)
PDF 1.7 Level 8 (Acrobat 10 – 11)
PeopleSoft
PeopleSoft PS_TOKEN
phpBB3
PHPS
Plaintext
PostgreSQL
PostgreSQL CRAM (MD5)
PrestaShop
PunBB
RACF
Radmin2
RAR3-hp
RAR5
Redmine
RIPEMD-160
Samsung Android Password/PIN
SAP CODVN B (BCODE)
SAP CODVN F/G (PASSCODE)
SAP CODVN H (PWDSALTEDHASH) iSSHA-1
scrypt
SHA-224
SHA-256
SHA-3 (Keccak)
SHA-384
SHA-512
SHA1
sha1($pass.$salt)
sha1($salt.$pass.$salt)
sha1($salt.$pass)
sha1($salt.sha1($pass))
sha1($salt.unicode($pass))
sha1(CX)
sha1(md5($pass))
sha1(sha1($pass))
sha1(unicode($pass).$salt)
sha256($pass.$salt)
sha256($salt.$pass)
sha256($salt.unicode($pass))
sha256(unicode($pass).$salt)
sha256crypt
sha512($pass.$salt)
sha512($salt.$pass)
sha512($salt.unicode($pass))
sha512(unicode($pass).$salt)
sha512crypt
SIP digest authentication (MD5)
SipHash
Skip32
Skype
SMF (Simple Machines Forum)
Sybase
TrueCrypt
vBulletin
VeraCrypt
WBB (Woltlab Burning Board)
Whirlpool
Windows Phone 8+ PIN/password
WinZip
WordPress
WPA
WPA2
xt:Commerce

This list is not updated, and other formats may be supported. For more info, call 1.800.237.4200.