misc

Michael Schneider

Head of Auditing

Michael Schneider has been in IT since 2000. Since 2010 he is focused on information security. He is an expert at penetration testing, hardening and the detection of vulnerabilities in operating systems. He is well-known for a variety of tools written in PowerShell to find, exploit, and mitigate weaknesses.

His Profiles

mail

twitter

mastodon

github

vuldb

News about him (German)

Vorlesung am CAS Cyber Security der ZHAW

Vorlesung am CAS Cyber Security der ZHAW

Vorlesung im CAS Cyber Security der ZHAW

Vorlesung im CAS Cyber Security der ZHAW

Vortrag zu Windows Hardening an BSides Zürich

Vortrag zu Windows Hardening an BSides Zürich

Vorlesung zu Security Testing an CAS Cyber Security der ZHAW

Vorlesung zu Security Testing an CAS Cyber Security der ZHAW

Vorlesung zu Security Testing an CAS Cyber Security der ZHAW

Vorlesung zu Security Testing an CAS Cyber Security der ZHAW

Vorlesung an CAS Cyber Security der ZHAW

Vorlesung an CAS Cyber Security der ZHAW

Tool HardeningKitty auf GitHub veröffentlicht

Tool HardeningKitty auf GitHub veröffentlicht

Führungswechsel Red Team

Führungswechsel Red Team

Vortrag zu Darknet und Kryptographie

Vortrag zu Darknet und Kryptographie

Interview an Area41

Interview an Area41

Vorträge und Workshops an Area41 in Zürich

Vorträge und Workshops an Area41 in Zürich

Recent Articles by Him

Area41 2024

Area41 2024 - A Recap

Reporting and Documenting

Reporting and Documenting - Unpopular and Yet So Important

Introduction of CVSS v4.0

Introduction of CVSS v4.0 - More Effort Than Benefit?

Rogue Device

Rogue Device - Remote Control and Data Encryption

Windows LAPS

Windows LAPS - Local Admin Password Management Revised

Microsoft Intune

Microsoft Intune - Impact on Defender Configuration Analysis

Network Time Security

Network Time Security - Securing NTP Against MITM Attacks

Web Proxy with Kerberos

Web Proxy with Kerberos - A Basic Configuration Guide

Forced Authentication

Forced Authentication - Attacks against NTLM via SMB and WebDAV

Network Provider

Network Provider - Sneaky alternative to extract credentials

Attacks via Peripheral Devices

Attacks via Peripheral Devices - Trade-off between Security and Usability

Farewell NTLM

Farewell NTLM - It is time to disable NTLM

You want more?

Do you have any questions?

Our experts will get in contact with you!