Skip to content

Severins kleine Cyber Seite

Für ein Phishing Mail ist man nie zu alt!

  • Discovery
  • About Me
  • Impressum

Enterprise access model

On March 6, 2021 By Severin Winkler In Gefundenes

This document describes an overall enterprise access model that includes context of how a privileged access strategy fits in. For a roadmap on how to adopt a privileged access strategy, see the rapid modernization plan …

Continue reading

PowerShell Logging and Security

On February 19, 2021 By Severin Winkler In Gefundenes

This tutorial aims to help you get PowerShell logs from your endpoints into your SIEM to protect you from modern PowerShell abuse. https://www.secjuice.com/enterprise-powershell-protection-logging/

Continue reading

Was neues um an EDR vorbeizukommen – ScareCrow

On February 3, 2021 By Severin Winkler In Gefundenes

ScareCrow is a payload creation framework for generating loaders for the use of side loading (not injection) into a legitimate Windows process (bypassing Application Whitelisting controls). https://github.com/optiv/ScareCrow

Continue reading

Das OWASP DevSecOps Maturity Model: Secure the Pipelines!

On January 28, 2021 By Severin Winkler In Gefundenes

Schöne Darstellung des Matrix DevSecOps Maturity Model: https://dsomm.timo-pagel.de/

Continue reading

Eine Roadmap wie man in das Thema (Ethical) Hacking einsteigen kann…

On January 27, 2021 By Severin Winkler In Gefundenes

This repository is an overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX compatible, free and …

Continue reading

Die größte Referenzliste an Listen zu Cyber Security Themen

On January 27, 2021 By Severin Winkler In Gefundenes

Attacking & Securing Active Directory Table of Contents https://rmusser.net/docs/Active_Directory.html

Continue reading

Top 16 Active Directory Vulnerabilities

On January 27, 2021 By Severin Winkler In Gefundenes

Most organizations and business around the world today use Active Directory in their infrastructure as central management solution for managing their resources. But as any other similar technology, Active Directory is very complex and securing …

Continue reading

Purchased Microsoft 365 E5, Now What?

On January 25, 2021 By Severin Winkler In Gefundenes

The Microsoft 365 E5 suite is essentially a large amount of the products Microsoft offers for the Enterprise environment, more so focused towards the security and compliance areas.

Continue reading

Awesome Penetration Testing

On January 25, 2021 By Severin Winkler In Gefundenes

Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities. Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕).

Continue reading

Securing Active Directory: Performing an Active Directory Security Review

On January 25, 2021 By Severin Winkler In Gefundenes

During the , Sean Metcalf covered a number of Active Directory (AD) components and areas that should be reviewed for potential security issues.

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 Next Posts»

Recent Posts

  • AWS Security Maturity Model
  • Sysmon Tools
  • Secrets of Successful Security Programs – Part 1
  • Blockchain + SSI = ID?
  • Microsoft 365 Licensing

Archives

  • May 2022
  • March 2022
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • October 2020

Categories

  • Gefundenes
  • Uncategorized
WordPress Theme: Chronus by ThemeZee.