Red Team Lab Series (Part 10):Embracing Purple Teaming – Uniting Red and Blue for Stronger Security
Welcome to the final installment of our blog series for IT professionals transitioning into...
Read MoreSelect Page
Mar 23, 2025 | Cyber Security | 0 |
Welcome to the final installment of our blog series for IT professionals transitioning into...
Read MoreMar 22, 2025 | Cyber Security | 0 |
Welcome back to Part 9 of our Microsoft Defender XDR and Sentinel journey! So far, you’ve rolled...
Read MoreMar 22, 2025 | Cyber Security | 0 |
In this eighth installment of our Blue Team training series, we’ll step into Microsoft Sentinel –...
Read MoreMar 21, 2025 | Cyber Security | 0 |
Welcome back to our series! In Part 6, we walked through how the Red Team compromised our lab...
Read MoreMar 21, 2025 | Intune, Windows 11 | 0 |
As organizations begin piloting Windows 11 24H2 deployments across their enterprise environments,...
Read MoreMar 20, 2025 | Cyber Security | 0 |
Welcome back to the final post in our red teaming blog series! Part 7 and on from here will focus...
Read MoreMar 20, 2025 | Windows Server | 0 |
Part 9: Deploying a Domain Controller in Azure and Integrating It Many organizations are embracing...
Read MoreMar 19, 2025 | Cyber Security | 0 |
In our previous posts, we gained access to the target machine test001 as user John and explored...
Read MoreMar 19, 2025 | Windows Server | 0 |
With the new domain controllers fully in place and the old ones retired, one often-overlooked...
Read MoreMar 18, 2025 | Cyber Security, Windows 11, Windows Server | 0 |
Part 4: Credential Access with Mimikatz & Rubeus and Lateral Movement with Evil-WinRM...
Read MoreMar 18, 2025 | Windows Server | 0 |
After decommissioning the old domain controllers, one final polish step can make your migration...
Read MoreMar 17, 2025 | Cyber Security | 0 |
In Part 2 of this series, we established a Covenant C2 connection by launching a Grunt on the...
Read MoreMar 17, 2025 | Windows Server | 0 |
Part 6: DNS Migration and Decommissioning Legacy Domain Controllers With FSMO roles now on the new...
Read MoreMar 16, 2025 | Cyber Security | 0 |
Welcome back! In Part 1, we set up our Commando VM attack platform. Now in Part 2, we’ll get our...
Read MoreMar 15, 2025 | Cyber Security, Windows Server | 0 |
So, you’re an IT professional curious about offensive security? Welcome to the first post of our...
Read MoreMar 15, 2025 | Windows Server | 0 |
Active Directory operates with a multi-master replication model, but certain operations are...
Read MoreMar 15, 2025 | Windows Server | 0 |
With deploying the new Windows Server 2025 domain controllers and their successful replication, it...
Read MoreMar 14, 2025 | Windows Server | 0 |
With the schema now extended for Windows Server 2025, it’s time to move forward with...
Read MoreMar 13, 2025 | Windows Server | 0 |
One of the first technical steps in introducing Windows Server 2025 Domain Controllers is updating...
Read MoreMar 13, 2025 | Intune, Uncategorized, Windows 11 | 0 |
Introduction Deploying the Remote Help application in Microsoft Intune can be approached in...
Read MoreMar 12, 2025 | Windows Server | 0 |
In this series, we’ll walk through a hands-on, zero-downtime Active Directory Domain Services (AD...
Read MoreMar 10, 2025 | Windows Server | 0 |
If you are planning a DHCP migration to an on-premises Windows Server 2025, this post will be of...
Read MoreMar 6, 2025 | Windows 10, Windows 11 | 0 |
Introduction When faced with a suspicious file, a systematic and cautious approach is crucial to...
Read MoreMar 5, 2025 | Intune, Windows 10, Windows 11 | 0 |
Introduction Buckle up, as this is a long one. Why? I thought it would be good to get a bunch of...
Read MoreFeb 21, 2025 | Uncategorized, Windows 11 | 0 |
When you consider keeping your Windows system secure and up to date, most of your attention goes...
Read More