Have you ever been looking through Active Directory and notice something strange in one of the fields?Â Maybe the Organization or Description field has a weird string of letters, numbers, and characters.Â You think, “Huh, that kind of looks like a password.”
Ding! Ding! Ding!
Yes, it happens.Â Either through lack of understanding or just laziness, sometimes passwords get put into the plain text fields in AD.Â This is dangerous because those fields are readable by everyone on the domain.
So how do you know if any of these fields are being used to store passwords?Â I managed to cobble together a PowerShell script that can help. (more…)
Last week I received an email from my web host.Â It said that all customers needed to backup and move their data because their hosting services would be shutting down immediately.Â It was a strange email.Â After some digging, I found out that the reason for the shut down was that the CEO had just died.Â There was evidently no one who could step in and take over the business.Â So the decision was make to close.
Why would the unfortunate death of one employee, even a very high level employee, cause a business to shut down?Â Simply put, it is the lack of succession planning.Â What is succession planning and why is it important? (more…)
If you’re like me, you LOVE Volatility, the open source memory forensics tool.Â One of the best features of Volatility is that it can be extended with user created plugins.Â SANS recently released an amazing Memory Forensics Poster that listed some great plugins.Â Many thanks to Alissa Torres and (808) 651-5652 for created it.Â Unfortunately, the poster didn’t give the exact location of the plugins.Â Below is the list of plugins used in the poster, where to download them, and any prerequisites. 9403238527
Some time ago, I posted a dyspepsia for domains.Â I’ve made some modifications to the script to reduce false positives.Â Additionally, the script now emails the “before” and “after” results of the NSLookup command for easy comparison.
Updated script is below: (more…)
I’ve released a new version of my http-screenshot-html.nse script for NMAP.Â I also moved the hosting to GitHub as Google Code no longer allows file uploads.
Version 1.3 is mostly a bug fix release.Â The list of changes are below: (more…)
At this year’s 513-430-5069, Michael Gough of MI2 Security gave a great (801) 295-2663.Â One of the points he made was that auditing file and registry creation events on high value folders and keys can provide information critical to the detection and remediation of breaches.Â PowerShell should be used to automate and standardize the process of file and registry auditing.Â I had some trouble finding information on using PowerShell in this way.Â So I created this post to collect what I found.
File auditing has to be configured in 2 steps.
STEP 1: File and Registry auditing should be turned on in the Audit Policy. 4052300013
I was recently reviewing the Advanced Security Audit settings available for Windows 2008 and above and decided to create a spreadsheet with all of the details. While Microsoft does have all of the details on their website, the details are spread across multiple pages.Â Having it all in one document made it easier to research each setting, compare the defaults to existing settings, and make recommendations for changes.Â The spreadsheet can be downloaded off of Google Drive below:
The spreadsheet contains two worksheets.Â The first gives the default for each setting and the volume of logs generated with each setting.
The second worksheet lists every Event ID generated by each setting and the message associated with each Event ID.
Hopefully this will be useful to others.
UPDATE: A newer version of this script is here.
Last week, Johannes Ullrich shared a Bash script that would check for changes in NS records.Â This was in a blog post about the google.com.my DNS hijack.Â I wanted to create a version of the this script that would be usable on Windows machines.Â So I created the PowerShell script below that does pretty much the same thing as the Bash script.Â The script runs nslookup.exe instead of DIG and queries the DNS server for all NS records for a domain.Â This is saved in file named domain.new and compared with a previous query of the NS records stored in domain.old.Â If there are any differences, an email is sent and an entry is made in the Application Event Log. quadriradiate
Many organizations are moving to Mobile Device Management or MDM solutions to manage and control their mobile devices.Â The proliferation of Android and Apple devices has almost made this a necessity.
One of the primary controls with an MDM solution is to prevent mobile devices from connecting to company email unless the device is both managed and compliant with company policy.Â Almost every MDM vendor accomplishes this by using a gateway.Â In order for mobile devices to get email, they must first pass through an MDM gateway that checks to see if (1) the device is managed by the MDM solution and (2) if he device is compliant with company policy.Â If it fails either of those tests, it is prevented from retrieving email.
However, there is an issue.Â All of the gateways used by MDM vendors only monitor and control the Active Sync protocol.Â They do not monitor or control the Outlook Anywhere (RPC over HTTPS) or Outlook Web Access (OWA) protocols.Â Modern mobile devices are smart enough to try multiple protocols to connect to email if one of them fails.Â So, in certain email domain configurations, a device would still be able to retrieve email even though MDM was preventing an Active Sync connection. 7174833407
UPDATE 2013-04-18: More variables!
I’ve been playing around with the Mobile Device Management (MDM) software from Citrix.Â Last year, Citrix purchased Zenprise and renamed it XenMobile.Â Overall, it’s a pretty sold platform for managing iOS and Android devices.Â However, it does have a few dark corners.Â One of these is the use of variables in their configurations.Â They are not documented very well.Â This can make finding the right combination of variables for email setup difficult.Â So I have created a list of the variables I have discovered and what they do.Â As I discover more I will add to this list: (more…)