[BlackHat Asia 2019] CQTools: The New Ultimate Hacking Toolkit 

On March 27 and 28, 2019, Paula presented Briefings and Arsenal sessions at Black Hat Asia 2019 in Singapore. You can find below all the details about team-made CQTools and become familiar with the newest and really exciting tools our Team has prepared for Singapore.

>>> Scroll down to learn more, check the slides & download the tools and whitepaper! >>>

Deep dive into CQTools

CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature.

 

About the Black Hat

You probably already know Black Hat events from our previous posts, but let’s sum up some basic info about BH! Black Hat is one of those conferences where cybersecurity masters meet board-level executives who have responsibility for security governance in enterprises and organizations. For more than 20 years BH has provided attendees with the very latest insights in development and trends in information security research. This is a perfect place for announcing new CQtools allowing the ultimate privilege elevation and network attacks!

Watch-out, handout!

As was promised, Paula’s BH ASIA presentation slides can be found below.

Now you can download our tools (password: CQUREAcademy#123!) LINK

and whitepaper written by Paula Januszkiewicz and CQURE Team LINK.

 

Stay CQURE and see you soon!

Read more