cybersecurity
education
€ EUR
  • $ USD
  • € EUR

#CQLabs – Extracting Roamed Private Keys from Active Directory by Michael Grafnetter

Previously on CQLabs This article is a continuation of a previous one, called #CQLabs 5 – DSInternals PowerShell Module. Introduction One of the lesser known features of Active Directory (AD) is called Credential Roaming. When enabled, it synchronizes DPAPI Master Keys, user certificates (including the corresponding private keys) and even saved passwords between computers. We […]

9 Security Tips for Working Remotely

We have gathered some essential facts about remote working security, as it may have some challenges to overcome. Check out our new poster and discover tips that will help you to keep your home office (or wherever you work from) safe. Download the poster below!   1. There are always some IT knights in the […]

Hacking Summer Camp: How to Steal Kerberos Tickets?

Welcome to the second episode of our Hacking Summer Camp! We hope you enjoyed Resetting the Admin’s Password Illegally and are now ready and steady for another adventure. Get ready for a decent portion of useful tools and tips.   Episode 2: How to Steal Kerberos Tickets?   Hi Security Enthusiasts! Today is the time […]

[RSA Conference 2020 APJ] Paula’s session on Forensic Techniques against Hackers

Paula Januszkiewicz held an intense session today (July 17th) at the RSA Conference 2020 the Asia Pacific and Japan. What an excellent event!  This year’s edition was unique, as for the first time the event took place completely online. That was a challenge for everyone, however – we treat it as a new learning opportunity!  But one thing is for sure, the whole world is going online, and the pandemic has just helped […]

Hacking Summer Camp: Network Sniffing Techniques

  Here comes the next episode of our Hacking Summer Camp! Do you still remember How to Steal Kerberos Tickets? Now we have prepared another bunch of hacking tips&tricks for you, that you might find useful.   Episode 3: Network Sniffing Techniques How you ever wondered what is causing THAT traffic on your network interface […]

Hacking Summer Camp: Memory Analysis Guide, Part 1

  Hopefully, you’ve had a big cup of coffee today, because episode 4 of our Hacking Summer Camp is out and this one will be REALLY intense! If you’d like to warm up, we recommend you to take a look at the previous episode on Network Sniffing Techniques. Ready? Let’s start!   Episode 4: Memory Analysis Guide Part One, Memory […]

CQURE Forensic: The Efficient Forensic Toolkit

CQForensic: The Efficient Forensic Toolkit

When will CQForensic save you?   CQForensic can build an attack timeline, extract information from the USN journal, recover files (also from MFT), decrypt user’s and system’s stored secrets (like encrypted data), extract information from Prefetch and Remote Desktop Session cache, and extract information from the configuration of the used for administration tools. With CQ […]

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form