Cached Credentials: Important Facts That You Cannot Miss
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Read moreUser Secrets: How to Get Them Back Using Password Recovery Tools
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system). Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Read more
Hacks Weekly #55 Insecure Data storage
Welcome to another episode of the CQURE Hacks Weekly series. This time we will focus on insecure data storage. We're going to learn what insecure data storage is, how it can be exploited and what are the risks and consequences of insecure data storage.
Read more
Hacks Weekly #53 Hybrid Analysis
As with everything that you might find online, it is necessary to verify the information you have. The same goes for Cybersecurity-related information. To ensure the correctness of findings you should cross-check them with other tools/services available to you.
Read more