sunainforWntrsldrs's Writeupssunainwho.hashnode.net·Dec 17, 2022Why I Failed my First attempt at PNPTHi, readers I've spent the last few months getting ready for PNPT from TCM security. And from the first day of the exam until the very last day, it was an eye-opening experience. Fortunately, I'll have another chance soon, and this time I'll be ready...Discuss·4 likes·566 readspnpt
Cyrill GremaudforCISEL - Technical Security Blogciselsecurity.hashnode.net·Jun 27, 2022Active Directory Auditing with Ping CastleL'audit d'un Active Directory Microsoft peut se révéler très complexe et l'un des risques est de ne pas prendre en compte tous les paramètres. Ping Castle offre une méthodologie complète des outils pour couvrir le spectre complet d'un AD Microsoft. S...Discuss·1 like·136 readsMicrosoft Active Directoryaudit
Brandon BowmanforBrandon's Cloud Blogbrandonscloud.hashnode.net·Sep 14, 2022Local Administrator Password Solution (LAPS)Problem When you set up a new computer or Windows server, Systems Administrators have been notoriously guilty of using the same password, with a local administrator account, and never changing it. Face it. We are all guilty of it. Password reuse is ...Discuss·1 like·335 readsWindows
Ash RobertsforSwitchITUpswitchitup.hashnode.net·Apr 19, 2023Lets build: Domain Controller - Server CoreIntroduction: In an ideal world, we should be deploying domain controllers on Windows Server Core. Ugh really but that's an effort there are no pretty buttons! No Thanks! Let me finish! Powershell is not so scary when you get used to it and Server Co...DiscussWindows ServerMicrosoft
Abhyuday SinhaforAbhyuday Sinha's DevOps Learninglearningdevops.hashnode.net·Mar 11, 2023Active DirectoryActive Directory (AD) is Microsoft's proprietary directory service. It runs on Windows Server & enables admins to manage permissions and access to network resources. Active Directory stores data as objects.An Object is a single element, such as a use...Discuss·41 readsActive Directory
GGGforgeekgeekgogeekgeekgo.hashnode.net·Feb 25, 2023Active Directory Powershell : Get all members of a nested group and export to csv"Group-Name" = change to whatever group you wish to report members on, the '-recursive' option ensures that members of all nested groups are included. "All-Group-Members.csv" = file that is created and populated with the results of the query (usernam...DiscussPowershell
Tennyson OnovwionaforKloudTenncloudtenn.hashnode.net·Jan 16, 2023Authenticating Azure Static Web App with Single Azure Active Directory Tenant.Introduction Static Web App is one of Microsoft's incredible products that enable you to speed up the development of your app using modern programming frameworks such as React, Vue.JS, and Angular, among others. This is accomplished through its pre-b...Discuss·199 readsAzure
Pradeep BhattaraiforPradeep Bhattarai's Blogpr0d33p.hashnode.net·Dec 26, 2022Active Directory: Misconfigurations, Lab and Best PracticesActive Directory Active Directory is a directory service used by organizations to store information about their users, computers, and other network resources. It's used primarily to provide a secure way to manage users, applications, and network reso...Discuss·46 readsActive Directory
sunainforWntrsldrs's Writeupssunainwho.hashnode.net·Dec 17, 2022Why I Failed my First attempt at PNPTHi, readers I've spent the last few months getting ready for PNPT from TCM security. And from the first day of the exam until the very last day, it was an eye-opening experience. Fortunately, I'll have another chance soon, and this time I'll be ready...Discuss·4 likes·566 readspnpt
AdrianforAdrian's CyberSecurity blog |adrianjanula.hashnode.net·Dec 8, 2022What is Kerberos and how does this protocol work?Why do I write about it? I don't know why I like this protocol, but probably because of its name, which is quite interesting. Kerberos has a bit in common with the three-headed dog, Cerberus. The word itself is an interesting cluster of letters, let ...Discuss·52 readsauthentication
Simon DiehmforSimon Diehmsimondiehm.hashnode.net·Nov 30, 2022Reverse engineering file share shortcut processUpon starting a new role in a new team at a new company, one of the IT processes that was not fully understood by existing staff was how desktop shortcuts to file shares were created on user's desktops. Here is a rundown of my process to "reverse eng...Discuss·46 readsreverse engineering
Brandon BowmanforBrandon's Cloud Blogbrandonscloud.hashnode.net·Sep 14, 2022Local Administrator Password Solution (LAPS)Problem When you set up a new computer or Windows server, Systems Administrators have been notoriously guilty of using the same password, with a local administrator account, and never changing it. Face it. We are all guilty of it. Password reuse is ...Discuss·1 like·335 readsWindows
Tanulata SahuforTanulataonlinebusiness.hashnode.net·Sep 12, 2022A Guidebook on Active Directory Security Groups | OssistoActive Directory Security is a Microsoft Windows-enabled Directory Service that plays a vital role in Information Technology. Its services pertain to managing applications, users, data, and many other attributes of an organization’s network. Every ph...DiscussActive Directory