Link Dump

Email Spoofer | File Encryption | Proxy Check | Proxy List | Skype IP Grabber:https://orcinustech.com/web-tools/index.phpRansomware Decryptors:https://www.watchpointdata.com/ransomware-decryptorsOpen Source Cyber Security News:https://n0where.net/Secure Yourself or the Enterprise:https://decentsecurity.com/Virus Scan File or URL:https://www.virustotal.com/Hacker News:https:…

Nano Server 2016 Image Creation

I recently took a dive into Nano Server 2016 and it's capabilities. I figured I'd share my findings and explain how to get exposure and setup a Nano Server.You'll need:Nano Server Image Builder https://www.microsoft.com/en-us/download/details.aspx?id=54065 Server 2016 Media: https://www.…

PXE Boot Surface Pro 4 MDT/WDS

This is a simple how-to for booting Surface Pro 4's to PXE. This guide utilizes both PXE and UEFI on a MDT/WDS setup.Verify the following DHCP roles are configured on the correct DHCP server scope:066 Boot Server Host Name: IP of MDT/WDS Server 067 Bootfile Name:…

AWS Tools

Defensive:Scout2: https://github.com/nccgroup/Scout2 – Security auditing tool for AWS environments (Python)Prowler: https://github.com/toniblyx/prowler – CIS benchmarks and additional checks for security best practices in AWS (Shell Script)CloudSploit: https://github.com/cloudsploit/scans – AWS security scanning checks (NodeJS)CloudMapper: https://github.com/duo-labs/cloudmapper…

Security Practices to Preach

This document is intended for readers with some experience in information technology.Defensive Security is a critical and effective way of thinking. In this post we'll cover it from a domain perspective aka corporate network. I'll go over each proposed layer of security and how to protect yourself as well…

Windows 10 Privacy Hardening

I've been asked by colleagues to write down my process for hardening windows systems and share. Many of these people have extensive backgrounds in UNIX, but aren't familiar with Windows environments. This post isn't for any reason other than to make you aware of what you're being mined for. It's…

Windows 2016 Domain Controller Setup

This guide assumes you have a hyper-visor and VMs and/or physical boxes to support this setup. This guide uses fresh install of Server 2016 fully patched up for reference.Install the following roles by opening up server manager and enabling the following:Active Directory Domain Services DHCP Server DNS…

MSSQL .BAK Encryption

This post goes over TSQL commands to setup and test encrypted backups for MSSQL. Commands provided are intended to be ran on both a Source and Target instance. These should be ran using an SA account to avoid permission issues. If storage paths don't work, just use c:\temp\ and…

Drupal/WordPress Environment w/ Docker

This Tutorial assumes your have Docker Toolbox installed and fully operational.Within Docker Quickstart Terminal get a copy of the latest MySQL image:$docker pull mysqlStart your MySQL container running:$docker run --name mysql -e MYSQLROOTPASSWORD=example -d mysqlGet a WordPress image:$docker pull wordpressGet your WordPress container running and…

Selenium Setup in Visual Studio

This is a generalized guide for configuring Selenium on Windows.Create a directory named Selenium under C:\Copy the directory downloaded from http://docs.seleniumhq.org/download/ in this example I'm setting up the Java specific package.Within IE set all Security Zones to the same protection levelAdd wildcards for…