#CQLabs – CVE-2019-15511: Broken Access Control in GOG Galaxy

This article covers a vulnerability discovered in GOG Galaxy, which may result in Local Privilege Escalation due to a lack of authorization of commands sent via a local TCP connection. The attacker may exploit this vulnerability to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed. Background I’ve recently started looking at […]
AWSC SNEAK PEEK- Attacks on Credentials & Prevention Solutions – part III

We have arrived at the final part of the Advanced Windows Security Course test ride! You can find the first and the second parts of our sneak peek series into the first part of the module that was recorded during the live session by Paula at AWSC17. What does accompany every AWSC live session? A […]
Ask us a question

Are there some burning cybersecurity questions that linger back in your mind, but there’s never enough time to find the answers? Now we make it possible! During Black Hat Europe on December 2nd-5th, our team will make a special Q&A session and go through your questions. You can ask about: 👉 CQURE’s team 👉 Black […]
[Black Hat Europe 2019] Arsenal – CQForensic: The Efficient Forensic Toolkit

Today Paula Januszkiewicz and Mike Jankowski-Lorek presented CQURE’s forensic toolkit during the Arsenal session at Black Hat Europe 2019 in London. Find the description and tools below! CQForensic: The Efficient Forensic Toolkit CQForensic Toolkit enables you to perform detailed computer forensic examinations. It guides you through the information gathering process providing data for analysis and […]
[Black Hat Europe 2019] Video Summary

If you have any questions please drop us a message via our contact form.
Exploiting Windows Hello for Business – Mike Jankowski-Lorek talks with Michael Grafnetter

Here it is – the very special interview from #BHEU 2019, led by our best journalist on board, Mike Jankowski-Lorek. 🎤 We had the opportunity to talk to Michael Grafnetter right after his keynote session and find out more about his Windows Hello for Business. Are you curious how this password-less authentication tool works? Watch the video and […]
#CQLabs – Windows Defender Exploit Guard under the hood by Artur Wojtkowski

Antivirus software usually uses malware signatures, behavioral detection or heuristic detection to block malware. All these methods may be insufficient in case of APT (Advanced Persistent Threat) attacks prepared specifically for the victim or attacks exploiting 0day vulnerabilities in software, that were never seen before. Exploit Guard: Exploit Protection and Exploit Guard: Attack Surface Reduction […]
#CQLabs – Extracting Roamed Private Keys from Active Directory by Michael Grafnetter

Previously on CQLabs This article is a continuation of a previous one, called #CQLabs 5 – DSInternals PowerShell Module. Introduction One of the lesser known features of Active Directory (AD) is called Credential Roaming. When enabled, it synchronizes DPAPI Master Keys, user certificates (including the corresponding private keys) and even saved passwords between computers. We […]
9 Security Tips for Working Remotely

We have gathered some essential facts about remote working security, as it may have some challenges to overcome. Check out our new poster and discover tips that will help you to keep your home office (or wherever you work from) safe. Download the poster below! 1. There are always some IT knights in the […]
1 day to Windows Forensics Mastery – Cybersecurity Online Course

If you have any questions please drop us a message via our contact form.