Elcomsoft Forensic Disk Decryptor 2.20
Trusted Download
41.7 MB

Elcomsoft Forensic Disk Decryptor 2.20

Opens encrypted BitLocker, TrueCrypt or PGP files
3.3 
Rating
Your vote:
Latest version:
2.20 See all
Developer:
Awards (1)
Show all awards
Software Informer Editor Rating 5
Trusted Download
41.7 MB

Gain complete access to data stored in crypto containers. The utility extracts information protected by desktop and portable versions of BitLocker, PGP, and TrueCrypt protection. It works with separate volumes or complete disks. Mounting encrypted volumes as new drive letters for the instant, real-time access is possible.

Elcomsoft Forensic Disk Decryptor can help you access encrypted data. The program is definitely not intended for the common users, as it is forensic specialists who benefit the most from this type of software. Despite the evident complexity of using such a program, its interface unquestionably makes the whole process feel much easier, particularly because it has been designed in a wizard-like fashion.

The tool is operated in two different modes. The first lets you decrypt or mount a disk, which becomes accessible through a system drive letter. The second mode simply provides the keys that are necessary to access the encrypted data.

Various decryption methods can be used, such as memory dump, saved keys, password and hibernation files. In this regard, it is quite significant that the program can capture the data contained in the computer’s RAM memory with its kernel-level tool. Another source of data can come from a computer’s hibernation file.

Elcomsoft Forensic Disk Decryptor can effectively deal with the most widely used disk encryption types, including VeraCrypt, TrueCrypt, BitLocker, PGP disk and PGP WDE. In the case of PGP, notice that it can equally provide access to both encrypted volumes and full disk encryptions. more

PC Senior editor
Editor rating:
rating

Screenshots (8)

Review summary

Pros

  • Supports various types of encryption
  • Provides on-the-fly access to encrypted data
  • Catches data from the RAM and the hibernation files
  • Supports various decryption methods
  • Wizard-like interface

Cons

  • Not intended for the common user

Comments

3.3
Rating
6 votes
5 stars
1
4 stars
2
3 stars
2
2 stars
0
1 stars
1
User

Your vote:

Suggestions