Home
Search results “Cryptoapi certificate store in windows”
mimikatz :: crypto :: export non exportable certificates & RSA keys
 
01:48
How to use mimikatz and its crypto module to export non exportable certificates & RSA keys. Support CryptoAPI and CNG (CNG patch requires admin rights, not for the export) Downloads : http://blog.gentilkiwi.com/mimikatz
Views: 16859 Benjamin Delpy
SSL Certificate Error Fix
 
03:01
This is a tutorial on how to fix the ssl error or 107 error,in google applications.
Views: 636722 Ilya Novickij
How To Fix Invalid SSL Certificate In Steam
 
03:03
Hi Guys, I Wanna Show You "How To Fix Invalid SSL Certificate In Steam" Please Share, Like, And Subscribe Me If This Video Helped You. Thx. ====================================================== Add Me At Steam: http://steamcommunity.com/id/legendaryarthur/ ENTER ARTHURMASS ON CSGOWHEEL.COM TO GET 100C
Views: 24234 decoyout
How to create, list, or destroy virtual smart cards on Windows
 
05:45
Recommended: turn on CC (closed captioning) in this video! If your computer has a Trusted Platform Module (TPM) chip, and if it is enabled in the BIOS, then you can leverage some of the benefits of smart card security by creating a PIN-protected virtual smart card, which lives on the TPM in a protected memory space, similar to an expensive Hardware Security Module (HSM). You can use your enabled TPM to securely store a virtual smart card which can safely contain sensitive information, such as private keys from an RSA key pair. This video explains how to create, list, or destroy a virtual smart card (VSC) on Windows 10. IMPORTANT: Administrator privileges are required. Note #1: The "Admin Key" must be a 48-character hex-encoded value. Do NOT copy the admin key in this video; there's nothing magic or special about it. Just do a Google search for "convert plain text to hex". Type in any 24-character string of your choice in plain text, convert those 24-characters from plain text into hex, and then remove any spaces in the converted text. You should now have 48 characters of hexidecimal text, which you can use for the admin key. Note #2: The PIN Unlock Key (PUK) is useful whenever the virtual smart card is locked due to a user inputting an incorrect PIN too many times. If there is a lock, it is temporary, but you can input the PUK at that time to release the lock. Note #3: One practical application of this technology is to enable SSH to connect to a server. The public key would need to be already on the server in the "authorized_keys" file. The private key, in this case, would be safely protected in the TPM and unavailable for reading or copying or brute-forcing. The way you can access the private key in order to SSH to the server is to use software that leverages the Windows crypto API. Instead of using a program like PuTTY (which requires the path to a private key on the hard drive), use a patched version of PuTTY known as PuTTYWinCrypt (which can use Windows crypto APIs to access the private key on a specified virtual smart card). Below is the text that is used in the video. Replace the placeholder X's with your own values: ================================ NAME OF VIRTUAL SMART CARD: XXXXXXXXXXXXXXXX PIN: XXXXXXXXXXXXXXXX ADMIN KEY (must be a 48-character hex-encoded value): XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX PUK: XXXXXXXXXXXXXXXX COMMAND TO CREATE A VSC (using name of the virtual smart card above): tpmvscmgr.exe create /name "XXXXXXXXXXXXXXXX" /pin PROMPT /pinpolicy minlen 10 uppercase REQUIRED lowercase REQUIRED digits REQUIRED specialchars REQUIRED /AdminKey PROMPT /puk PROMPT /attestation AIK_AND_CERT /generate LIST ALL VSC's: wmic path win32_PnPEntity where "DeviceID like '%smartcardreader%'" get DeviceID,Name,Status COMMAND TO DESTROY A VSC (using a specific DeviceID): Tpmvscmgr destroy /instance "XXXXXXXXXXXXXXXXXXXXXXXXX" ================================
Views: 1119 Jason McNeill
Network Security - Use Crypto API to Encrypt and Decrypt
 
14:37
Fundamentals of Computer Network Security This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst. course 2 Basic Cryptography and Programming with Crypto API: About this course: In this MOOC, we will learn the basic concepts and principles of cryptography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks, and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel. We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm, and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge, we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account. Develop Secure Programs with Crypto API In this module, we learn how to use Crypto API to write secure programs for encrypting and decrypting documents, and for signing and verify documents. We then apply the techniques to enhance the registration process of a web site which ensures the account created is actually belonging to the owner of the email account the request profile. Learning Objectives • Develop secure programs with Crypto API for encryption, authentication, and integrity checking • Enhance the registration process of the web site by using the crypto api • Create and utilize the Crypto API to sign and verify documents Subscribe at: https://www.coursera.org
Views: 196 intrigano
Hacks Weekly #22: CQURE’s Discovery in Data Protection API
 
08:33
In this episode of CQURE Hacks Weekly we’re sharing our important discovery within Data Protection API NG (New Generation). If you want to learn how to decrypt a password from PFX files and more... watch the tutorial! https://cqureacademy.com/blog/windows-internals/data-protection-api
Views: 1148 CQURE Academy
Cunning With CNG: Soliciting Secrets From Schannel
 
46:38
by Jake Kambic Secure Channel (Schannel) is Microsoft's standard SSL/TLS Library underpinning services like RDP, Outlook, Internet Explorer, Windows Update, SQL Server, LDAPS, Skype and many third party applications. Schannel has been the subject of scrutiny in the past several years from an external perspective due to reported vulnerabilities, including an RCE. What about the internals? How does Schannel guard its secrets? This talk looks at how Schannel leverages Microsoft's CryptoAPI-NG (CNG) to cache the master keys, session keys, private and ephemeral keys, and session tickets used in TLS/SSL connections. It discusses the underlying data structures, and how to extract both the keys and other useful information that provides forensic context about connection. This information is then leveraged to decrypt a session that uses ephemeral key exchanges. Information in the cache lives for at least 10 hours by default on modern configurations, storing up to 20,000 entries for client and server each. This makes it forensically relevant in cases where other evidence of the connection may have dissipated.
Views: 387 Black Hat
Tutorial "Capicom"
 
01:35
Views: 1989 GrupoAutofax
Windows 10 Universal Apps - Cryptographic App
 
12:59
Website : http://www.edmtdev.com Guide to Writing an encryption application based on the coding system is provided by .NET Link Project : http://ouo.io/stFxJM Windows 10 development, Windows 10 development for absolute beginners, Windows 10 development tutorial, Windows 10 app development tutorial, Windows phone 10 development, Windows 10 application development, Windows 10 mobile development, Windows 10 game development, Windows 10 iot development
Views: 438 EDMT Dev
Features new to Windows XP
 
01:57:56
Windows XP introduced many features not found in previous versions of Windows. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 628 Audiopedia
Consistent PKCS#11 in Operating Systems improving user experience and security in RHEL and Fedora
 
25:11
by Jakub Jelen At: FOSDEM 2019 https://video.fosdem.org/2019/UD2.218A/pkcs11_in_os.webm During last year, we worked hard to make cryptographic tokens usage consistent across the operating system and to improve its usability, mostly using the means of PKCS#11 URIs. This was done for both administrators and end users, in the end resulting in easier configuration of HSMs and authentication using smart cards and cryptographic tokens. I will outline what we worked on to improve the user experience and support for smart cards, cryptographic tokens and HSMs across the operating system. I will share experience with implementing or improving this support across various applications, libraries and tools, experience with testing them and making sure they work together in Linux distribution. I will focus on the current state in Fedora and RHEL 8 and propose some future steps that we have yet to take. Room: UD2.218A Scheduled start: 2019-02-03 16:30:00+01
Views: 35 FOSDEM
DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel
 
41:17
Secure Channel (Schannel) is Microsoft's standard SSL/TLS Library underpinning services like RDP, Outlook, Internet Explorer, Windows Update, SQL Server, LDAPS, Skype and many third party applications. Schannel has been the subject of scrutiny in the past several years from an external perspective due to reported vulnerabilities, including a RCE. What about the internals? How does Schannel guard its secrets? This talk looks at how Schannel leverages Microsoft's CryptoAPI-NG (CNG) to cache the master keys, session keys, private and ephemeral keys, and session tickets used in TLS/SSL connections. It discusses the underlying data structures, and how to extract both the keys and other useful information that provides forensic context about connection. This information is then leveraged to decrypt session that use ephemeral cipher suites, which don't rely on the private key for decryption. Information in the cache lives for at least 10 hours by default on modern configurations, storing up to 20,000 entries for client and server each. This makes it forensically relevant in cases where other evidence of connection may have dissipated. Bio: Jake Kambic is a DFIR researcher and network penetration tester
Views: 1339 DEFCONConference
C# encrypting and decrypting using AES CBC, safe storing the encrypted data
 
18:24
In this tutorial i'm going to show you how to encrypt, decrypt data using AES(Advanced Encryption Standard), and storing the encrypted data in safe place. Source code: https://drive.google.com/file/d/0BxW01l6w6JYfd1pTZVBjaWxhWEU/view?usp=sharing
Views: 57818 Dawisko1
Java prog#129. How to encrypt and decrypt data in Java Part 1
 
10:17
------------------Online Courses to learn---------------------------- Java - https://bit.ly/2H6wqXk C++ - https://bit.ly/2q8VWl1 AngularJS - https://bit.ly/2qebsLu Python - https://bit.ly/2Eq0VSt C- https://bit.ly/2HfZ6L8 Android - https://bit.ly/2qaRSAS Linux - https://bit.ly/2IwOuqz AWS Certified Solutions Architect - https://bit.ly/2JrGoAF Modern React with Redux - https://bit.ly/2H6wDtA MySQL - https://bit.ly/2qcF63Z ----------------------Follow--------------------------------------------- My Website - http://www.codebind.com My Blog - https://goo.gl/Nd2pFn My Facebook Page - https://goo.gl/eLp2cQ Google+ - https://goo.gl/lvC5FX Twitter - https://twitter.com/ProgrammingKnow Pinterest - https://goo.gl/kCInUp Text Case Converter - https://goo.gl/pVpcwL -------------------------Stuff I use to make videos ------------------- Stuff I use to make videos Windows notebook – http://amzn.to/2zcXPyF Apple MacBook Pro – http://amzn.to/2BTJBZ7 Ubuntu notebook - https://amzn.to/2GE4giY Desktop - http://amzn.to/2zct252 Microphone – http://amzn.to/2zcYbW1 notebook mouse – http://amzn.to/2BVs4Q3 ------------------Facebook Links ---------------------------------------- http://fb.me/ProgrammingKnowledgeLearning/ http://fb.me/AndroidTutorialsForBeginners http://fb.me/Programmingknowledge http://fb.me/CppProgrammingLanguage http://fb.me/JavaTutorialsAndCode http://fb.me/SQLiteTutorial http://fb.me/UbuntuLinuxTutorials http://fb.me/EasyOnlineConverter Password Encryption.java JAVA ENCRYPTION/DECRYPTION PROGRAM HELP Encrypting and Decrypting Java Cryptography using Java in Netbeans IDE Cryptography using Java in Netbeans IDE Java Cryptography APIs Cryptography Encrypting and Decrypting a text file in java
Views: 101448 ProgrammingKnowledge
DEF CON 21 - Neil Sikka - EMET 4 0 PKI Mitigation
 
38:58
EMET 4.0 PKI Mitigation NEIL SIKKA SOFTWARE SECURITY ENGINEER, MICROSOFT Microsoft EMET is a free Mitigation tool. In addition to its memory corruption exploit mitigations, a newly introduced feature is the PKI mitigation. This mitigation implements x509 certificate pinning to prevent usage of forged certificates in HTTPS sessions in the web browser. This talk is technical as it demos EMET in action and explains how the PKI mitigation works. Neil Sikka (@neilsikka) is a computer security enthusiast and researcher. He works at Microsoft on MSRC (Microsoft Security Response Center) as a Software Security Engineer where he analyzes 0day exploits and other security vulnerabilities in any Microsoft software, and develops security tools such as EMET. In addition to his security research at work, he also likes to do security research on his free time at home on nights and weekends. He has a technical blog where he posts his security research (http://neilscomputerblog.blogspot.com/). facebook.com/neilsikka Materials: https://www.defcon.org/images/defcon-21/dc-21-presentations/Sikka/DEFCON-21-Sikka-EMET-4.0-PKI-Mitigation-Updated.pdf
Views: 808 DEFCONConference
DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel
 
41:17
Secure Channel (Schannel) is Microsoft's standard SSL/TLS Library underpinning services like RDP, Outlook, Internet Explorer, Windows Update, SQL Server, LDAPS, Skype and many third party applications. Schannel has been the subject of scrutiny in the past several years from an external perspective due to reported vulnerabilities, including a RCE. What about the internals? How does Schannel guard its secrets? This talk looks at how Schannel leverages Microsoft's CryptoAPI-NG (CNG) to cache the master keys, session keys, private and ephemeral keys, and session tickets used in TLS/SSL connections. It discusses the underlying data structures, and how to extract both the keys and other useful information that provides forensic context about connection. This information is then leveraged to decrypt session that use ephemeral cipher suites, which don't rely on the private key for decryption. Information in the cache lives for at least 10 hours by default on modern configurations, storing up to 20,000 entries for client and server each. This makes it forensically relevant in cases where other evidence of connection may have dissipated. Bio: Jake Kambic is a DFIR researcher and network penetration tester
Views: 29 Security Hub
Random password generators  High impact Strategies   What You Need to Know  Definitions  Adoptions
 
00:33
https://store.theartofservice.com/random-password-generators-high-impact-strategies-what-you-need-to-know-definitions-adoptions-impact-benefits-maturity-vendors.html While there are many examples of random password generator programs available on the Internet, generating randomness can be tricky and many programs do not generate random characters in a way that ensures strong security. ...In easy to read chapters, with extensive references and links to get you to know all there is to know about Random password generators right away, covering: Random password generator, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password management, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronisation, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Single sign-on, Swordfish (password), Windows credentials, Zero-knowledge password proof, Bach's algorithm, Barrett reduction, BB84, Beaufort cipher, Block cipher modes of operation, CDMF, Ciphertext stealing, Common Scrambling Algorithm, CryptGenRandom, Crypto++, Cryptographically secure pseudorandom number generator, Cycles per byte, Feedback with Carry Shift Registers, Feige-Fiat-Shamir Identification Scheme, Generating primes, GGH encryption scheme, Hash chain, HOTP, Industrial-grade prime, ISMACryp, JOSEKI (cipher), Key schedule, Key Wrap, Kochanski multiplication, KR advantage, Linear feedback shift register, Mental poker, Modular exponentiation, Montgomery reduction, MOSQUITO, Pairing-based cryptography, Randomness extractor, RC algorithm, Residual block termination, Rip van Winkle cipher, Schoof's algorithm, Secret sharing using the Chinese remainder theorem, SecureLog, Shamir's Secret Sharing, Snuffle, Substitution-permutation network, Summation generator, Symmetric-key algorithm, Time-based One-time Password Algorithm, Type 1 product, Type 2 product, Type 3 product, Type 4 product, Verifiable random function.
Views: 62 TheArtofService