Information Technology Reference
In-Depth Information
2. Navigate to the backup file.
3. Select the attack method. Several options are available and dictionaries can be ad-
ded to increase the success rate of the attack, as shown in the following screen-
shot:
The Elcomsoft Phone Password Breaker attack options
4. If cracked, the password will be displayed and can be used to access the encryp-
ted backup file with the use of a forensic tool. It is important to use a forensic tool
that will prompt you for the password. Some will simply fail or finish with errors
and provide no access to the encrypted data, as shown in the following screen-
shot:
Search WWH ::




Custom Search