0% found this document useful (0 votes)
131 views18 pages

Ultimate Cybersecurity Hacking Toolkit

This document introduces the CQTools hacking toolkit created by the CQURE Team. It provides over 20 tools for penetration testing activities like information extraction, password dumping, shell generation, and avoiding antivirus detection. Brief descriptions are given for each tool's capabilities, such as monitoring the Windows Subsystem for Linux, dumping Windows credentials, decrypting DPAPI keys, and generating custom payloads. Background is also provided on the CQURE Team and their expertise in cybersecurity training and research.

Uploaded by

Sayan Kr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views18 pages

Ultimate Cybersecurity Hacking Toolkit

This document introduces the CQTools hacking toolkit created by the CQURE Team. It provides over 20 tools for penetration testing activities like information extraction, password dumping, shell generation, and avoiding antivirus detection. Brief descriptions are given for each tool's capabilities, such as monitoring the Windows Subsystem for Linux, dumping Windows credentials, decrypting DPAPI keys, and generating custom payloads. Background is also provided on the CQURE Team and their expertise in cybersecurity training and research.

Uploaded by

Sayan Kr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

CQ Tools:

The New Ultimate Hacking Toolkit


by
Paula Januszkiewicz ([email protected])
Mike Jankowski-Lorek, Ph.D. ([email protected])
Krystian Zieja ([email protected])
Adrian Denkiewicz ([email protected])
Matus Puskar ([email protected])
Artur Wojtkowski ([email protected])
Michał Grzegorzewski ([email protected])

Warsaw New York Dubai Zug

[email protected]

www.cqure.pl
www.cqureacademy.com
Paula Januszkiewicz is a world-renowned cybersecurity
Expert, a founder of CQURE and CQURE Academy, and
Microsoft Regional Director and MVP.
CQURE Academy focuses on cybersecurity training
program consisting of over 20 high-quality technical
workshops and seminars and providing certification to
specialists. Additionally, in October 2016 CQURE has
successfully launched online and subscription-based
training.
CQURE Experts speak at international events and engage
in multiple cybersecurity projects – they bring their
knowledge and experience to trainings. CQURE Academy
also involves R&D – that is why CQURE Team is
recognizable in the cybersecurity field.
Content
About ................................................................................................................................................................................... 5
CQ Tools Technical Details ................................................................................................................................................ 5
CQWSLMon.exe ............................................................................................................................................................................. 5
CQSecretsDumper.exe ................................................................................................................................................................. 5
CQNTDSDTDecrypter.exe ........................................................................................................................................................... 6
CQRegKeyLastWriteTime.exe ..................................................................................................................................................... 6
CQLsassSecretsDumper.exe ....................................................................................................................................................... 6
CQDPAPIExportPFXFromAD_mimikatz_way.exe .................................................................................................................. 6
CQMasterKeyAD.exe .................................................................................................................................................................... 7
CQDPAPIBlobDecrypter.exe ....................................................................................................................................................... 7
CQDPAPIBlobSearcher.exe ......................................................................................................................................................... 7
CQDPAPIEncDec.exe .................................................................................................................................................................... 7
CQDPAPIKeePassDBDecryptor.exe .......................................................................................................................................... 8
CQDPAPINGPFXDecrypter.exe .................................................................................................................................................. 8
CQRDCManDecrypter.exe .......................................................................................................................................................... 8
CQETWKeylogger.exe .................................................................................................................................................................. 8
CQMasterKeyDecrypt.exe ........................................................................................................................................................... 9
CQMasterKeyEncrypt.exe ............................................................................................................................................................ 9
CQCreateProcessWithParent.exe .............................................................................................................................................. 9
CQDGAGenerator.exe................................................................................................................................................................ 10
CQElevate ...................................................................................................................................................................................... 10
CQImpersonate.exe .................................................................................................................................................................... 10
CQFindBin.exe .............................................................................................................................................................................. 10
CQHashesCalc.exe ...................................................................................................................................................................... 10
CQHashDumpv2.exe ................................................................................................................................................................... 11
CQMSGDecode.exe ..................................................................................................................................................................... 11
CQPfxRegenerator.exe ................................................................................................................................................................ 11
CQReflectivePELoader.exe ......................................................................................................................................................... 11
CQPrefetchParser.exe ................................................................................................................................................................ 12
CQEVTXRecovery.exe................................................................................................................................................................. 12
CQRegTool.exe ............................................................................................................................................................................ 12
CQARPSpoofer.exe ..................................................................................................................................................................... 12
CQCat.exe...................................................................................................................................................................................... 13
CQReverseShellGen.exe ............................................................................................................................................................ 13
CQRunInAppContainer.exe ...................................................................................................................................................... 14
CQSymbolInstaller.exe ............................................................................................................................................................... 14
About the Authors............................................................................................................................................................ 15
About CQURE ................................................................................................................................................................... 18
Notable Presentations...................................................................................................................................................... 18
About

CQURE Team has prepared tools used during penetration testing and packed them in a toolkit
called CQTools.

This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and
spoofing activities, going through information extraction, password extraction, custom shell
generation, custom payload generation, hiding code from antivirus solutions, various keyloggers
and leverage this information to deliver attacks. Some of the tools are based on discoveries that
were released to the world for the first time by CQURE Team.

CQURE was the first team that did a full reverse engineering of DPAPI (Data Protection Application
Programming Interface) and prepared the first public tool that allows to monitor WSL (Windows
Subsystem for Linux) feature.

CQ Tools Technical Details


A detailed description of tools in CQTools toolkit is provided below.

CQWSLMon.exe
Windows Subsystem for Linux (WSL) is a compatibility layer for running Linux binary executables
(in ELF format) natively on Windows 10 and Windows Server 2019. CQWSLMon is the first publicly
know tool that allows to monitor the interaction with the subsystem.

CQSecretsDumper.exe
Allows to dump credentials. Details: https://cqureacademy.com/blog/secure-server/how-to-use-
groupmanaged-service-accounts-gmsa-vs-service-accounts
CQSecretsDumper /secret /service /sec /sys
Available parameters:
--verbose Enable full data output (before interpretation
of first 16 bytes)
--bootkey Dump bootkey from the SYSTEM hive
--service=VALUE Dump password data for the service
--secret=VALUE Dump decrypted data from the secret
--sec=VALUE Path to the SECURITY reg file
--sys=VALUE Path to the SYSTEM reg file
Providing any: /sec or /sys switch enables offline analysis.
In offline mode you have to provide both: /sys and /sec files
Online mode requires access to the SECURITY registry, which by default is
accessible only by the SYSTEM account.
CQNTDSDTDecrypter.exe
Decrypts ntds.dit file by providing an appropriate Bootkey, extracts password hashes, KDS master
root keys. More details: https://cqureacademy.com/blog/windows-internals/data-protection-api
Usage: CQNTDSDTDecrypter /bootkey /file
Available parameters:
--bootkey=VALUE The bootkey, extracted from the registry.
--file, --ntds=VALUE The ntds.dit file containing the AD data.
--outfile, --out=VALUE The text file containing decrypted password
hashes.
--pfxfile, --pfx=VALUE The file containing dpapi pfx.
--kdsrootkeyfile, --kds, --kdsrootkey=VALUE
The file containing dpapi-ng Group Key
Distribution Service master root key.

CQRegKeyLastWriteTime.exe
Allows to extract information about the datetime when the Registry Key was modified for the last
time. This information may be helpful in forensics or malicious code development (to know what
trails are generated by the code).
Usage: CQRegKeyLastWriteTime.exe <reg_key> CQSecretsDumper.exe

CQLsassSecretsDumper.exe
Dumps DPAPI Golden Key (Backup key) from LSASS to pfx file. When DPAPI is used in an Active
Directory domain environment, a copy of user’s master key is encrypted with a so-called DPAPI
Backup Key. Windows Server 2000 use a symmetric key and newer systems use a public/private
key pair. If the user password is reset and the original master key is rendered inaccessible to the
user, the user’s access to the master key is automatically restored using the backup key. DPAPI
Backup Key cannot be changed, so the leakage of the key may result in the need for
reconfiguration of the whole environment.
Usage: CQLsassSecretsDumper /file
Available parameters:
-h, -?, --help This help
--file, -f=VALUE The output file name

CQDPAPIExportPFXFromAD_mimikatz_way.exe
Extract DPAPI Golden Key in pfx format from AD the same way Mimikatz does it.
Usage: CQDPAPIExportPFXFromAD_mimikatz_way /file
Available parameters:
-h, -?, --help This help
--file, -f=VALUE The output file name
CQMasterKeyAD.exe
Allows decryption of DPAPI protected data by leveraging usage of the private key stored as a LSA
Secret on a domain controller (we have called it a ‘backup key,’ and it is a key corresponding to
the backup public key stored in the domain user’s profile). The backup key allows decrypting
literally all of the domain user’s secrets (passwords / private keys/information stored by the
browser). In other words, someone who has the backup key is able to take over all of the identities
and their secrets within the whole enterprise.
Usage: CQMasterKeyAD /file /pfx /newhash
Available parameters:
--pfx=VALUE Path to the pfx file containing RSA private key
(DPAPI Golden Key).
--file=VALUE Path to the Masterkey file.
--newhash=VALUE MD4 or SHA1 (but the same algo as for oldhash!)
for new masterkey. In AD environment and domain
accounts most probably MD4, in standalone: SHA1.

CQDPAPIBlobDecrypter.exe
Decrypts Blob with DPAPI. This tool has unique feature of using masterkey for decryption instead
of WINAPI and providing password like most of the decrypters.
Usage: CQDPAPIBlobDecrypter /masterkey /goldenkeyfile
Available parameters:
--master=VALUE The masterkey provided as a hex string.
--entropy=VALUE Entropy used during encryption.
--blob, --blobfile=VALUE
The binary file containing blob itself
--out, --outfile=VALUE Text file containing decrypted blob in hextext

CQDPAPIBlobSearcher.exe
Search for DPAPI blobs inside a file.
Usage: CQDPAPIBlobSearcher /file /outdir

Available optional parameters:


-f, --file=VALUE File to be searched
-d, --dir=VALUE Directory to be searched
--reg, --regkey=VALUE Registry key to be searched
-r Search recursively
-o, --outdir=VALUE Path to a directory to store the DPAPI blobs
extracted from the file

CQDPAPIEncDec.exe
Encrypts and decrypts text using DPAPI.
CQDPAPIKeePassDBDecryptor.exe
Allows to decrypt KeePass database by using DPAPI data that is possessed from the domain. It
provides access to all users’ KeePass databases and it uses DPAPI data leveraged by
CQMasterKeyAD. The tool uses decrypted Master Key of the user in order to decrypt key that
encrypts KeePass database.
The tool will try to save reencrypted file to the same directory, as the original. The password used
to reencrypt is 'cqure' without quotes.
Usage: CQDPAPIKeePassDBDecryptor /key /file
Available parameters:
-k, --key=VALUE The key decrypted from the DPAPI blob.
-f, --file=VALUE The KeePass database file.

CQDPAPINGPFXDecrypter.exe
Leverages DPAPI-NG used in the SID-protected PFX files. The tool allows to decrypt SID-protected
PFX files even without access to user’s password but just by generating the SID and user’s token.
More details: https://cqureacademy.com/blog/windows-internals/data-protection-api
Usage: CQDPAPINGPFXDecrypter /pfx /master
Available parameters:
--pfx=VALUE The pfx file exported with sid-based security.
--masterkey, --master, -m=VALUE
The hex string containing msKds-RootKeyData
attrib data.

CQRDCManDecrypter.exe
Decrypts RDCMan .rdg files with provided masterkey and extracts credentials from it.
Usage: CQRDCManDecrypter /file /master
Available parameters:
--file, -f=VALUE Path to the .rdg file of the Remote Desktop
Connection Manager.
--master, -m=VALUE The Masterkey decrypted. You can specify more
than one masterkey, simply add another /master

CQETWKeylogger.exe
Keylogger based on ETW (Event Tracing for Windows). It only uses features built in Windows
system, so no additional software is needed to perform the attack.
CQMasterKeyDecrypt.exe
Decrypts service masterkey from MS SQL Server that is protected by DPAPI. It may be used to
bypass TDE (Transparent Data Encryption) protection. It’s the only publicly known tool for that
purpose on the market.
Usage: CQMasterKeyDecrypt /masterkey /goldenkeyfile
Available parameters:
--sid=VALUE The sid of the user.
--hash=VALUE The pwdhash calculated from user password.
--golden=VALUE The file with golden key. You don't have to
specify the hash and the sid.
--file, --masterkeyfile=VALUE
The masterkey file to be decrypted.

CQMasterKeyEncrypt.exe
Encrypts masterkey with a new hash.
Usage: CQMasterKeyEncrypt /sid /file /oldhash /newhash
Available parameters:
--sid=VALUE SID of the masterkey owner.
--file=VALUE Path to the Masterkey file.
--oldhash=VALUE MD4 or SHA1 hash used to encrypt the masterkey.
--newhash=VALUE MD4 or SHA1 (but the same algo as for oldhash!)
for new masterkey. In AD environment and domain
accounts most probably MD4, in standalone: SHA1.

CQCreateProcessWithParent.exe
Allows to choose a process that will be a parent for the executed process. It enables the attacker
to hide original parent process from Sysmon and makes the forensic investigation much more
difficult.
Usage: CQCreateProcessWithParent /ppid /exe
Available parameters:
--ppid=VALUE The PID of the process to become a parent.
--exe=VALUE Exe to launch.
CQDGAGenerator.exe
Generator of domain names, based on the Domain Generation Algorithm -
https://en.wikipedia.org/wiki/Domain_generation_algorithm , e.x. used by CryptoLocker. The
generator may be used by the attacker to hide command and control server.
Usage: CQDGAGenerator [/from /to]
If run without params, produces 30 addresses, starting from today.

Available optional parameters:


--fmt={0 Domain display format, eg: {0}.com
--from=VALUE Starting date, in format: yyyy-mm-dd. If 'to'
param is omitted, 30 addresses are calculated,
starting from 'from' date.
--to=VALUE End date, in format: yyyy-mm-dd. Requires 'from'
param.

CQElevate
Exploits MS16-032 vulnerability. The bug relies on how handles are handled in multiprocessor
systems including Windows 10 and Windows Server 2012 R2. It relies heavily on FuzzySecurity
code published in GitHub. Details: https://cqureacademy.com/blog/malware/elevation-from-
regular-user-to-the-localsystem-notes-from-microsoft-ignite-2016
Usage: Elevate-Cmd <command>

CQImpersonate.exe
This tool allows you to run a command in the context of any of the authenticated users from your
system. This tool requires to be run in the LOCAL_SYSTEM context.
Usage: CQImpersonate /exe /user
Available parameters:
-u, --user=VALUE the username for the token
-c, --cmd=VALUE exe name to be run.

CQFindBin.exe
Searches for patterns in files.
CQFindBin <pattern> <file|dir>

CQHashesCalc.exe
MSDCC2 and NTHash calculator.
CQHashDumpv2.exe
Allows to dump hashes from the system and change passwords of the users. It’s one of the few
tools on the market that allows to do it both in offline and online.
Usage: CQHashDumpv2 /samdump /dccdump /sam /sec /sys
Available parameters:
--samdump Dump hashes from the SAM database
--dccdump Dump Domain Cached Credentials
--sam=VALUE Path to the SAM reg file
--sec=VALUE Path to the SECURITY reg file
--sys=VALUE Path to the SYSTEM reg file
--newmsdcc=VALUE Binary string with new MSDCC2
--pass=VALUE New password
--user=VALUE User name for new MSDCC2
Providing any: /sam /sec or /sys switch enables offline analysis.
In offline mode /samdump enforces /sam and /sys, and /dccdump enforces /sys and
/sec.
Online mode requires access to the SECURITY registry, which by default is
accessible only by the SYSTEM account.

CQMSGDecode.exe
Decodes MSG files.
Usage: CQMSGDecode <email.msg>

CQPfxRegenerator.exe
Regenerates PFX files.
Usage: PfxRegenerator /inkey /out /in [/in]
Available parameters:
--in=VALUE Path to the cert file (.cer). Can be reused to
create certs chain
--inkey=VALUE Path to the RSA key file (.rsaxml.txt)
--out=VALUE Path to the output pfx file

CQReflectivePELoader.exe
Reflective PE packer.
Usage: CQReflectivePELoader exefile
CQPrefetchParser.exe
This tool allows you to inspect prefetch files. Additionaly you can decompress the file (Windows 10
and newer only) and analyze it manually.
Usage: CQPrefetchParser /file /dir /out
Available parameters:
--analyze, -a Analyze the file
--decompres, -d Decompress the file
--dir=VALUE Path to the directory containing prefetch files
--file, -f=VALUE Path to the .pf file
--out, -o=VALUE Path to the decompressed .pf file (or directory,
where the files are going to be stored, if you
choose the /dir option)

CQEVTXRecovery.exe
Tries to repair corrupted eventlog files from [in] directory and place repaired into the [out]
directory.
Usage: EVTXRecovery -in -out:
Available parameters:
--in, --indir=VALUE directory path containing corrupted eventlog
files
--out, --outdir=VALUE directory path to store repaired eventlog files
--file, --infile=VALUE corrupted eventlog file

CQRegTool.exe
Registry analyzer.
Usage: CQRegTool /path /file
Available parameters:
--path=VALUE Path to the key containing the class
--file=VALUE Path to reg file (offline mode)
In offline mode you have to provide both: /path and /file

CQARPSpoofer.exe
Allows to perform ARP spoofing attack.
Usage: CQArpSpoof /clientip /gwip
Available parameters:
--clientIP, --client=VALUE
The ip address of the client.
--gwIP, --gw=VALUE The ip address of the gateway, server ip.
CQCat.exe
Modified netcat, networking utility for reading from and writing to network connections, that
enables the attacker to bypass most of AV systems.
[v1.11 NT www.vulnwatch.org/netcat/]
connect to somewhere: nc [-options] hostname port[s] [ports] ...
listen for inbound: nc -l -p port [options] [hostname] [port]
options:
-d detach from console, background mode

-e prog inbound program to exec [dangerous!!]


-g gateway source-routing hop point[s], up to 8
-G num source-routing pointer: 4, 8, 12, ...
-h this cruft
-i secs delay interval for lines sent, ports scanned
-l listen mode, for inbound connects
-L listen harder, re-listen on socket close
-n numeric-only IP addresses, no DNS
-o file hex dump of traffic
-p port local port number
-r randomize local and remote ports
-s addr local source address
-t answer TELNET negotiation
-u UDP mode
-v verbose [use twice to be more verbose]
-w secs timeout for connects and final net reads
-z zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]

CQReverseShellGen.exe
Generates TCP reverse shell exe file.
Usage: CQReverseShellGen /ip /port
Available parameters:
--ip=VALUE IP Address or hostname
--port=VALUE Port number
CQRunInAppContainer.exe
Runs application in AppContainer.
Usage: CQRunInAppContainer /exe /app
Available parameters:
--exe=VALUE Path to the exe to be launched in AppContainer
--app=VALUE AppContainer name. If not set, default:
CQAppContainer

CQSymbolInstaller.exe
Symbol installer.
Usage: CQSymbolInstaller /image /pdb /symstore
Available parameters:
--image=VALUE Path to the executable (.exe, .dll, .sys),
containing debug info (in RSDS format).
--pdb=VALUE Path to the symbol file.
--symstore=VALUE Path to the symstore directory.
CQTools license: Freeware.
About the Authors

Paula Januszkiewicz is the Founder and CEO of CQURE Inc.


and CQURE Academy. She is also Enterprise Security MVP,
honorable Microsoft Regional Director for CEE and a world
class cybersecurity expert, consulting Customers all around
the world. She is a top speaker at conferences including
Microsoft Ignite (she was rated No. 1 among 1,100 speakers
at a conference with 26000 attendees), RSA (in 2017 in USA
her two sessions were amongst the five hottest sessions),
Black Hat 2018 USA or Gartner Security Summit. Her
presentations gather thousands of people. In 2019, Paula’s
presentation was voted best of Black Hat Asia 2019 Briefings!

Paula has 17 years of experience in the cybersecurity field,


performing penetration tests, architecture consulting,
trainings and seminars. Every year, before the pandemic, she
took over 215 flights to provide security services, now she
delivers tons of projects online. Paula also creates security awareness programs for various
organizations, including awareness sessions for top management. Paula is a member of the
Technical Advisory Board at Royal Bank of Scotland – helping to keep its security at the highest level
possible! What is more, Paula has access to a source code of Windows!

Dr. Mike Jankowski-Lorek is a solution architect, developer,


data scientist and security expert with more than 17-years’
experience in the field. He designs and implements
solutions for Databases, Network & Management area,
mainly for Microsoft platform for medium to enterprise
level organizations. Mike holds multiple certifications,
especially security, database and software development
related. He is one of core Experts at CQURE – worldwide
known cyber security company. As a passionate person he
loves sharing his knowledge. Since 2007 he has been
closely cooperating with Polish-Japanese Academy of
Information Technology in Warsaw, teaching security,
database and data mining related subjects. Dr. Mike is
additionally interested in Big data, High Availability and real
time analytics especially when combined with machine
learning and artificial intelligent or natural language processing. He has completed his PhD – Dr.
academic knowledge, professional experience and strong technical skills. Dr. Mike is already an
author of multiple scientific publications, including a chapter in “Encyclopedia of Social Network
Analysis and Mining” published by Springer.
Krystian Zieja is a professional Infrastructure and Database
Consultant with over 20 years of extensive experience in
designing IT solutions. His practice spans from teaching
Oracle Courses in OAI at the University, to providing
services for big public and consulting companies serving
Clients from four continents. Being a holder of numerous
IT certificates such as OCP, MCSE, MCDBA and CISSP, he
is highly skilled in management as well as in programming
SQL and NoSQL databases.

Krystian is a professional of multiple specializations,


including designing architecture and solutions for
database servers, and Windows systems (Active Directory,
Exchange, IIS, PKI), Security Analysis, designing and
implementation of network systems and solutions related
to interactions between heterogeneous databases systems. The list continues with Administering
and Hardening Linux and Windows Operating Systems, network security and deployment of Virtual
Systems based on multiple technologies such as Hyper-V, KVM, Docker or OpenStack. It's also worth
mentioning that one of Krystian's specialization is also implementing log management systems using
Splunk or ELK. These are just a few topics that Krystian is extremely proficient in.

Krystian is an enthusiastic, hard-working individual with an interest in new technologies allowing for
further development of his skills. In his everyday life, he is keen on sports such as Brazilian Jiu-Jitsu,
shooting, box, judo, swimming and bicycles (just to name a few!).

Adrian Denkiewicz is CQURE’s Expert with over 10 years of


experience as Penetration Tester, Cybersecurity Expert, and
Software Developer. Previously, he worked for financial, e-
commerce, and semiconductor industry. Adrian performed
dozens of penetration tests and security reviews cooperating
with teams from all over the world. Adrian is a holder of several
offensive security certificates, including OSCP, OSCE and CRTE.
He participates in bug bounties and looks for critical
vulnerabilities in various products, ranging from web to internals
of operating systems. Adrian is passionate about learning a bit
of everything, but mostly things related to astronomy and rocket
science. He has even completed online rocket science course.
As for more ordinary stuff, he enjoys traveling, good books and
playing various board games.
Artur Wojtkowski is CQURE’s Specialist with over 10 years
of experience gained in many industries, mainly in
telecommunication, banking and insurance sector. He has
excellent skills in the area of infrastructure, web and
mobile application penetration testing. During his career,
his tasks also included: performing social engineering
tests, security code review, performance testing, security
management in telecommunication companies, ISO
27001 implementation, administration of SIEM and PKI
systems. Member of (ISC)2 and (ISC)2 Poland. Artur does
not treat cybersecurity only as his work – he is also a
cybersecurity passionate with two zero-day vulnerabilities
found on his account:
Oracle: https://www.oracle.com/security-alerts/cpujul2020.html
National Institute of Standards and Technology: https://nvd.nist.gov/vuln/detail/CVE-2017-
1000065

Matus Puskar is a CQURE’s Cybersecurity Specialist, trainer and


penetration tester. He has performed penetration tests for
companies from many industries, including banking, real estate,
transport sector. He has gained professional experience working
for payment service providers.

Michał Grzegorzewski – Our security genius and developer


for over 20 years, security researcher in CQURE Team, big fan
of Windows internals. For the past years he has been sharing
his knowledge as a speaker and contributor in various
conferences. One of the major contributors of Polish ASP.net
Group.
About CQURE
CQURE is a provider of specialized services in IT infrastructure security, business applications,
consulting and advisory services. CQURE provides the following services: high quality penetration
tests with useful reports, configuration reviews, incident response emergency services, security
architecture and design advisory, forensics investigation, security trainings and awareness for
management and employees.
Website: https://www.cqure.pl/
E-mail: [email protected]
CQURE Headquarters - Aleje Jerozolimskie 134, 02-305 Warsaw, Poland
CQURE Western Europe - Bahnhofstrasse 21 6300 Zug, Switzerland
CQURE North America - 1250 Broadway 36th Flr. New York, NY 10001, USA
CQURE Middle East - Emarat Atrium 423, Al Wasl Area 112344 Dubai, UAE

Notable Presentations

You might also like