
Dell Switch n2024 and n2048 Default Login
If you are looking for a default Login Account and Password you have come to the right place because there is no Default login for the Dell Switch n2024 or the n2048.
How to Access Dell Switch n2024 and n2048 Without a Password
- Grab your console cable and your computer.
- Make sure to install Putty which would be used to connect to the Dell n2024 or n2048 Switch.
- Manually reboot the switch and also have putty open and connected.
- When the Dell switch n2024 or n2048 loads you will get a message to select an option.
-
- 1- Start Operational Code
- 2- Display Boot Menu
-
- When you see the Dell Networking Boot Options, type “2” and press “Enter” to select within 3 seconds. If you miss this step the switch will need to be powered on again.
- Once the boot menu is loaded you will see options 1 through 12. Type

How To Migrate SYSVOL From FRS to DFSR
You are most likely here because you have encountered an issue during your Active Directory Domain Controller migration. Most likely your active directory is old, FRS was released back in Windows Server 2000 and was only supported up to Windows Server 2012. With Windows Server 2016 and Windows Server 2019 you must run DFSR instead of FRS. In this tutorial you will learn how to migrate SYSVOL from FRS to DFSR.
During your migration to the new environment, you may run in the following error if still using FRS and upgrading to new Domain Controller.
Windows Server version can no longer be added as an Active Directory domain controller (DC) to an existing domain that is still using File Replication Service (FRS) for replication of the SYSVOL share.
When you try to add a New Windows Server 2016- 2019 as a DC to the domain, you receive the following error … Read the rest

Phishing for Microsoft Teams Credentials
Phishing continues to be a pain in everyone’s rear end. This particular Phishing scam aims to rob you from your Microsoft Teams Credentials.
Since Microsoft Teams has become a favorable communication tool throughout the world of course hackers are now aiming to phish you into giving them your login information.
Abnormal Security said “Because Microsoft Teams is an instant messaging service, recipients of this notification might be more apt to click on it so that they can respond quickly to whatever message they think they may have missed based on the notification.”
What to look for
- The attack impersonates an automated message from what you think would be from Microsoft Teams.
- The from field would state “Theres new activity in teams”.
- The message from the teammate would craft a message with a sense of urgency.
- The email will have clickable URL’s and Buttons that direct you to a fake Office365

Cyber-Response Ethical Guidelines is a must read.
Now this was an interesting read from the website ethicsFIRST. They guide you through 12 ethical duties which are listed and explained. Of course some of it seems to be a little on the nose and why did you not ethically choose this path to begin with? Regardless these steps are great for people that seen to lack a cyber security ethics plan and path and could bring some confidence to your teams decision making.
The guidelines were launched on Oct. 21, Global Ethics Day, by FIRST.
For more, read here.
- Fixing WebView2 Issues on ARM64: Why Outlook and Teams Keep Breaking (and How to Fix Them)
- How to Enable Auto Recording & Transcription in Microsoft Teams and Assign Meeting Policies to All Users
- How to Install SentinelOne on Ubuntu 24.04
- How to Completely Remove SentinelOne from Ubuntu 24.04
- PowerShell Script to Force Uninstall Umbrella Roaming Client

Mobile Users Falling Victims To URL Spoofing
Yikes, aren’t there enough mobile vulnerabilities already? Now we have to tend to URL Spoofing and determining if the website is real or not?
A Rapid7 researcher named Tod Beardsley, which disclosed the vulnerability, said this flaw, is an instance of CWE-451 from the Common Weakness Enumeration. It is cause for concern because these victims on mobile devices can’t tell the difference between a real site and the fake site victims land on.
In its most common cases a user would get lured to click on a link from a social media site, or receive a text on their mobile device with a link that would take them to the fraudulent site. In just about every instance, once the user clicks, he’s asked to give up something, whether it’s credentials or credit card information.
… Read the rest“I can’t really tell the difference,” Beardsley said. “The mobile address bar is so small that

Hackers From Iran Are Spreading Dharma Ransomware Via RDP Ports
A group of hackers from Iran are targeting worldwide companies that use public-facing Remote Desktop Protocol (RDP) and infecting them with the Dharma Ransomeware.
The attackers would lunch their campaign by first scaning ranges of IPs for hosts that contained these vulnerable RDP ports like 3389 which is the default RDP port, afterwards attempt weak credentials. They have been using a scanning software called Masscan.
Once vulnerable hosts were identified, the attackers deployed a well-known RDP brute force application called NLBrute, which has been sold on the dark web forums. Using this tool, they are able to brute-force their way into the system, and then check the validity of obtained credentials on other accessible hosts in the network.
Attackers also attempted to elevate privileges using an exploit for an elevation privilege flaw. This medium-severity flaw (CVE-2017-0213), which affects Windows systems, can be exploited when an attacker runs a … Read the rest

Netgear Zero-Day Vulnerability Allows Full Takeover
A cybersecurity researcher found a Netgear Zero-Day vulnerability which allows full takeover of about 79 Netgear router models.
“The specific flaw exists within the httpd service, which listens on TCP Port 80 by default,” according to the ZDI report, which covers the bug’s presence in the R6700 series Netgear routers. “The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer.”
“This vulnerability affects firmwares as early as 2007 (WGT624v4, version 2.0.6),” he said in his post. “Given the large number of firmware images, manually finding the appropriate gadgets is infeasible. Rather, this is a good opportunity to automate gadget detection.”
Affected router models
According to Nichols, 79 Netgear router models and 758 firmware images contain the vulnerable HTTPD daemon.
A list of these affected models and firmware can be found in Nichols’ PoC exploit.… Read the rest

Restore Dell N4024 or N4048 Switch to factory defaults
To restore the Dell N4024 or N4048 switch to factory defaults you can follow the below procedure:
- Manually reboot your switch
- While the switch is booting up keep an eye on the bootup screen and find “Dell Networking Boot Options” and select option #2 (Display Boot Menu) within 3 seconds.
- On Boot Main Menu, enter choice # 10 for enable password removal.
Dell Networking Boot Options
Select a menu option within 3 seconds or the Operational Code will start automatically…
1 – Start Operational Code
2 – Display Boot Menu
Select Cl , 2) # 2
Boot Main Menu
1 – Start Operational Code
2 – Select Baud Rate
3 – Retrieve Logs
4 – Load New Operational Code
5 – Display Operational Code Details
9 – Reboot
10 – Restore Configuration to Factory Defaults
11 – Activate Backup Image
12 – Start Password Recovery
Enter … Read the rest

Restore Dell N3024 or N3048 Switch to factory defaults
To restore the Dell N3024 or N3048 switch to factory defaults you can follow the below procedure:
- Manually reboot your switch
- While the switch is booting up keep an eye on the bootup screen and find “Dell Networking Boot Options” and select option #2 (Display Boot Menu) within 3 seconds.
- On Boot Main Menu, enter choice # 10 for enable password removal.
Dell Networking Boot Options
Select a menu option within 3 seconds or the Operational Code will start automatically…
1 – Start Operational Code
2 – Display Boot Menu
Select Cl , 2) # 2
Boot Main Menu
1 – Start Operational Code
2 – Select Baud Rate
3 – Retrieve Logs
4 – Load New Operational Code
5 – Display Operational Code Details
9 – Reboot
10 – Restore Configuration to Factory Defaults
11 – Activate Backup Image
12 – Start Password Recovery
Enter … Read the rest

Unifi Cloud Controller Adoption Using SSH
In this Tutorial I will be showing you how to adopt New Unifi Devices to your Unifi Cloud Controller using the SSH Method.
We will first start off by:
- Download and install Advanced IP Scanner.
- Open the Advanced IP Scanner and run a scan to locate all your New Unifi devices.
- Note: Make sure network discovery is enabled on your computer
- Within Advanced IP Scanner make sure to notice the IP addresses that each Unifi Device is using.
- Download, install, and run: PuTTY
- Enter the IP address of the UniFi device, Port 22, Connection type: SSH, and click “Open”
- Login using the default username is ubnt and password is ubnt.
- In that same console window type without quotes “set-inform” followed by the server address http://yourdomain:8080/inform”
- Make sure to use a DNS name instead of an IP address.
- Make sure to use http:// instead of https:// and use :8080/inform,