Hacks Weekly #62 – Bypassing Windows Mark of the Web Protection
How can the Windows Mark-of-the-Web Protection be bypassed? 🦝 Amr Thabet, Malware Researcher & Incident Handler, presented some of the scenarios in episode 62 of our #HacksWeekly series! Windows Mark-of-the-Web Protection is just the first layer of protection. The problems start when users use 7-ZIP or delete the specific version of the file and download […]
Hacks Weekly #61 – Man in the middle with MITM6 and NTLMRelay
What is MITM6? MITM6 is an advanced penetration testing tool that exploits default Windows DNS configurations to facilitate man-in-the-middle (MITM) attacks. It targets mainly networks where IPv6 is enabled but not actively used. By responding to DHCPv6 messages, MITM6 can redirect traffic from vulnerable Windows machines to an attacker’s system. These redirections take place because […]
BLACK HAT EUROPE 2024!
We’re happy to share that the 2024 edition is also taking place with our involvement! And we have to admit, this year’s agenda looks promising. As always, we’re ready to share only the most relevant skills, thoroughly tested during real-life scenarios. System Forensics, Incident Handling and Threat Hunting On December 9, you’ll have the opportunity […]
Get a Sneak Peek into the Advanced Windows Security Course!
Over the years, the Advanced Windows Security Course has amassed hundreds of satisfied students, building a supportive community of cybersecurity enthusiasts and rising talents. We repeat it yearly, each time brainstorming to deliver the freshest techniques for combating cyber threats. As a result, the formula just keeps getting better. At CQURE Academy, our Experts consolidate […]
Hacks Weekly #60 – PetitPotam Strikes Back: From (almost) Zero to Domain Admin
PetitPotam: How an NTLM relay attack can threaten Active Directory, Active Directory Certificate Services and your network PetitPotam is an advanced coercing attack and in combination with NTLM relay (NTLM redirection) attack it creates a serious threat to Active Directory (AD) infrastructures. By exploiting vulnerabilities in the EFS (Encrypted File System) RPC calls, PetitPotam can […]
“Anyone can get hacked” – Forbes Interview with Paula Januszkiewicz
Forbes interview with Paula Januszkiewicz How hackers choose the bright or the dark side, what the global cybersecurity community thinks about the Russian hackers and how to become one yourself. Hackers are conventionally divided into “white” and “black”: the first legally check IT systems, the second break into them to steal information. Forbes spoke to Paula […]
Paula Januszkiewicz’s Interview for Cyber Security Europe
CSE: You are known as one of the few cybersecurity experts who have access to the entire Microsoft Windows source code. In your view, can a better understanding of computer operating systems contribute to our IT security? Paula Januszkiewicz (PJ): First of all, there are many effective and reliable hack attacks that almost always work. The […]
How You Can Become Part of an Elite Cybersecurity Force
Part of our mission is to help IT experts seriously level up their game to meet the demands of the exploding IT industry, particularly in the important field of cybersecurity. Our signature Advanced Windows Security Course is designed to train professionals to become experts in advanced Windows security techniques. Here’s a quick overview of how […]
[BlackHat Asia 2019] CQTools: The New Ultimate Hacking Toolkit
On March 27 and 28, 2019, Paula presented Briefings and Arsenal sessions at Black Hat Asia 2019 in Singapore. You can find below all the details about team-made CQTools and become familiar with the newest and really exciting tools our Team has prepared for Singapore. >>> Scroll down to learn more, check the slides & […]
[InfoSec Summit 2019] Paula Januszkiewicz and common cybersecurity mistakes, CQURE insights and techniques
The 2019 Summit was the 12th edition of the InfoSec Summit! It was a great pleasure to bring you the best of CQURE’s knowledge during Paula’s Januszkiewicz keynote and breakout sessions! >>> Scroll down to view slides and tools from Paula’s session and gain even more valuable knowledge >>> A couple of words about the […]