The Utilman.exe Hack combined with Windows Safe Mode to bypass XDR Solutions like CrowdStrike’s Falcon Sensor or Microsoft Defender for Servers
In this post I will show step by step the Utilman.exe hack on Windows Servers they protected by either CrowdStrike‘s…
Mastering Azure Application Gateway
This post will walk you through each step of setting up the Microsoft Azure Application Gateway to finally publish two different web…
How to reset a forgotten or not knowing Root Password for Linux by using the GRUB Boot Loader
In this post I want show how easily you can reset the root user password by using the GRUB 2…
Set up a 2-tier PKI in Active Directory Certificate Services (AD CS) – Part 3
In this part of my blog post series we will set up the Subordinate CA (Intermediate CA) which will be domain joined. Subordinate…
Set up a 2-tier PKI in Active Directory Certificate Services (AD CS) – Part 2
In this part of my blog post series we will set up the standalone offline Root CA which is not…
Set up a 2-tier PKI in Active Directory Certificate Services (AD CS) – Part 1
In this blog post series I want show step by step, how to setup a 2-tier PKI consisting of a…
Virtual Local Area Networks (VLANs) – Basics about Network Segmentation, inter-VLAN Routing & VLAN ACLs
The main aim of this post is to give you a comprehensive guide and introduction about the basics how VLANs,…
Microsoft Sentinel – a Cloud native SIEM Solution
In this post we will see what Microsoft Sentinel actually is and learn some basics to start with and how…
Explore the Microsoft Defender Family
In this post I want to give you a summary about what the Microsoft Defender family is exactly and what…
Set up Microsoft Defender for Endpoint
In this post I will show what Microsoft Defender for Endpoint is, how we can integrate it with Microsoft Intune…