User Secrets: How to Get Them Back Using Password Recovery Tools
What is DPAPI? Data Protection Application Programming Interface (DPAPI) is used in many Windows applications and subsystems. What is its purpose? For example: Credentials of Microsoft Outlook accounts stored in the registry; Credentials and encrypted cookies stored by Google Chrome; Credentials stored by IE in the registry under HKCU\Software\Microsoft\Internet Explorer; WiFi passwords saved in XML […]
How to Recover Corrupted EVTX Log Files and Extract Information
Find out: how to recover corrupted EVTX log files recover log files directly from a memory dump Watch the full video for more details and examples. Tools for EVTX file recovery Our experts developed this particular tool because there are so few options available online for fixing EVTX files. Try our CQEVTXRecovery tool. It is […]
A Look Inside the Pass-the-PRT Attack
Discover what a Primary Refresh Token is and how cyber-criminals are exploiting it in two different ways to launch Azure Active Directory attacks.
Man-in-the-middle attack – everything you need to know to perform it
Find out how Paula J, CQURE Academy CEO performs Man-in-the-middle attack, to know what to be aware of.
Don’t Take Candy or USBs from Strangers – USB attack is the serious threat
Find out how Paula J, CQURE Academy CEO performs Man-in-the-middle attack, to know what to be aware of.
How to Bury Risk in the Sand? Configure Windows Sandbox for malware analysis
Windows Sandbox can protect your PC from malicious executables. Here’s how to install and configure it correctly from a security expert.