fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR

Hacking Summer Camp: Network Sniffing Techniques

  Here comes the next episode of our Hacking Summer Camp! Do you still remember How to Steal Kerberos Tickets? Now we have prepared another bunch of hacking tips&tricks for you, that you might find useful.   Episode 3: Network Sniffing Techniques How you ever wondered what is causing THAT traffic on your network interface […]

Hacking Summer Camp: Memory Analysis Guide, Part 1

  Hopefully, you’ve had a big cup of coffee today, because episode 4 of our Hacking Summer Camp is out and this one will be REALLY intense! If you’d like to warm up, we recommend you to take a look at the previous episode on Network Sniffing Techniques. Ready? Let’s start!   Episode 4: Memory Analysis Guide Part One, Memory […]

CQURE Forensic: The Efficient Forensic Toolkit

CQForensic: The Efficient Forensic Toolkit

When will CQForensic save you?   CQForensic can build an attack timeline, extract information from the USN journal, recover files (also from MFT), decrypt user’s and system’s stored secrets (like encrypted data), extract information from Prefetch and Remote Desktop Session cache, and extract information from the configuration of the used for administration tools. With CQ […]

Hacking Summer Camp: Memory Analysis Guide, Part 2

Summer is slowly coming to an end, and so is our Hacking Summer Camp. But hey, there are still two intense episodes ahead, so we hope you’re still up for some hacking training! This time we will present an engrossing technique to you for grabbing information from memory. But before we start, take a look […]

User Secrets: How to Get Them Back Using Password Recovery Tools

What is DPAPI? Data Protection Application Programming Interface (DPAPI) is used in many Windows applications and subsystems. What is its purpose? For example: Credentials of Microsoft Outlook accounts stored in the registry; Credentials and encrypted cookies stored by Google Chrome; Credentials stored by IE in the registry under HKCU\Software\Microsoft\Internet Explorer; WiFi passwords saved in XML […]

Hacking Summer Camp: Sniffing and replaying ADFS claims with Fiddler

    Here comes the last, but not least episode of CQURE Academy’s Hacking Summer Camp! 🌴 We hope you’ve enjoyed these intense 2 months of security training and will find the presented tricks useful for your work. Here’s a list of all the previous parts, so you can catch up: Episode 1 Episode 2 […]

The tale of Enhanced Key (mis)Usage

Enhanced Key Usage

Smart Card Logon In order to logon to the Windows system with a Smart Card, a specific user certificate needs to be present on it. There are different ways of mapping certificate to a particular user account in Active Directory and concrete requirements for such a certificate described in Smart Card Technical Reference document. One […]

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form