Confidential intellectual property, networks, and systems depend on passwords chosen by end users. As managers, you must rely on your users to not place company assets at risk. At the same time, business functions are increasingly relying on password protected documents as a means to secure sensitive data, yet there are virtually no controls in place to ensure that the passwords used to protect those documents are adequate.
In many cases, little is done to enforce password standards beyond basic complexity controls built into authentication mechanisms. Your firm can have strong security controls, but all it takes to open up your intellectual property to an intruder is one weak user/administrator password.
To manage the risks associated with both of these scenarios, you need insight into how passwords are being chosen. Our Password Recovery Service was established to help quantify the risk for your organization and help you address these gaps as well as:
Why Our Password Recovery Service?
Until now, there have been three basic options when it comes to password security:
Why take those chances?
John Reed Stark Consulting, together with longtime partner KoreLogic Security, conducts their password recovery service in a highly secure manner by experts who are well known in the industry, published and trusted by the password cracking community for a wealth and diversity of knowledge. KoreLogic Security has been collecting patterns and developing custom rules/wordlists to maximize cracking results for nearly a decade.
Additionally, KoreLogic Security has been funded by the Defense Advanced Research Projects Agency (DARPA) to conduct research and build innovative solutions aimed at reducing and/or eliminating the security risks mentioned above. You can trust that KoreLogic will keep your data safe and deliver a quality product with expected results.
Confidentiality and Security
All of our systems used to distribute and/or crack any password hashes are:
Additionally, candidate hashes, documents, and any other client-supplied data are only stored within our proprietary cracking grid for the duration of the work order. These items are explicitly purged once the work order has ended.
What does our Password Recovery Service provide and not provide?
The service provides the following outputs:
Below are some examples of what the service cannot provide:
This Service will not support any potentially illegal or unethical activities.