Police tender for breaking passwords and security of Office 2007/2010/2013
Cybersecurity plays an extremely important role in the era of global Internet. In the last decade, the rise of cyberatics using cryptography has made securing the most important state institutions a priority. Fighting criminals to such priorities belongs. The Polish Police, in order to fight with professional criminal organizations whose aim is to break computer security and data encryption in order to obtain a ransom, has announced a tender for software and infrastructure that will increase the effectiveness of actions in identifying and combating cyber threats.
The tender for the cybercrypt @ gov project is aimed at strengthening the role of the Polish Police in detecting computer crimes and cybercrime by building a unique system with very high efficiency due to the use of distributed computing and the use of already existing infrastructure and IT resources on the Police equipment. Additional tasks to be completed by the announced tender are to strengthen cooperation between law enforcement authorities: the system will be used by various Police units (forensic laboratories, departments with Cybercrime KGP / KWP / CBŚP).
In the cybercrypt @ gov project guidelines we find a description of the tools that allow you to crack hashes based, among others, on for shortcuts: MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3 (Keccak), NetNTLMv1, NetNTLMv1 + ESS, NetNTLMv2, sha256crypt, sha512crypt, and an attempt to break security programs include: Office 2007, 2010, 2013, secured PDF files, KeePass password databases, password protected ZIP and RAR archives, and commonly used encryption applications such as Truecrypt, Veracrypt and Bitlocker.
The assumptions of the project are really impressive and it seems that the police have a snore on encrypted information with open encryption algorithms. It is worth remembering that the data is protected not only because of fear of surveillance or protection from law enforcement agencies. This is a natural way used by journalists, companies and ordinary people who have nothing to hide to protect their own interests and intellectual property from unauthorized access.
The cybercrypt @ gov project will be financed by the National Center for Research and Development. The contractor will not only be required to develop the necessary tools. Its tasks will include infrastructure management under the supervision of representatives of the Police Commander-in-Chief or other cooperating units delegated to this work.
Add new comment
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.