Show the saved password for SSID named “SSID_NAME” in Windows 8.
((netsh wlan show profiles name="SSID_NAME" key=clear | select-string "Key Content" ) -split(" Key Content : "))[1]
Nov 02 2014
Show the saved password for SSID named “SSID_NAME” in Windows 8.
((netsh wlan show profiles name="SSID_NAME" key=clear | select-string "Key Content" ) -split(" Key Content : "))[1]
Nov 01 2014
Recently a customer asked me about Active Directory Domain Trusts and how the passwords were managed. I replied with some educated guesses based on how AD manages a variety of passwords. After stating how I thought it worked (and mentioned that I wasn’t sure), I decided to look it up. I was mostly correct.
Every trust a domain maintains is represented by a Trusted Domain Object (TDO) in the Domain partition’s System container. The TDO contains the following attributes for a domain trust:
Forest trusts store the following attributes:
Since trust information is stored in Active Directory, all domains in the forest know about all of the trusts in place with all forest domains. External NT 4 trusts are not stored as TDOs and therefore are not in Active Directory.
Oct 31 2014
| [string] | Fixed-length string of Unicode characters |
| [array] | Array of values |
| [xml] | Xml object |
| [int] | 32-bit signed integer |
| [DateTime] | Date and Time |
| [long] | 64-bit signed integer |
| [decimal] | 128-bit decimal value |
| [single] | Single-precision 32-bit floating point number |
| [double] | Double-precision 64-bit floating point number |
| [char] | A Unicode 16-bit character |
| [byte] | An 8-bit unsigned character |
| [bool] | Boolean True/False value |
| [hashtable] | Hashtable object |
| [void] | Sends the datat to Null (same as piping to out-Null) |
Oct 30 2014
Each year, Microsoft invites security researchers (aka hackers) to speak to Microsoft employees about security issues.
One of the most interesting talks listed at “BlueHat” 2014 was the one by the “Pass-the-Hash” experts, Chris Campbell, Bejamin Delpy, and Skip Duckwall.
This talk will focus on the how Windows authentication works in the real world and what are the popular attacks against it. You will learn the thought process of attackers in the real world and how it differs from a defender’s perspective. We’ll also cover post-exploitation tools and techniques such as Mimikatz. Finally, we’ll discuss next steps – How do you design services that are breach-resistant and make authentication harder to crack.
Oct 29 2014
I just posted a “Security Resources” page that is a tab at the top of the site. This page contains useful security resources I have found over the years and plan on updating the content as needed.
Oct 29 2014
Microsoft’s Tip of the Day has the following useful information on Domain Controller File Replication Service (FRS) depercation:
FRS (File Replication Service) has been deprecated in Windows Server 2012 R2. The deprecation of FRS has been accomplished by enforcing a minimum domain functional level of Windows Server 2008. This enforcement is present only if the new domain is created using Server Manager or PowerShell. DCPromo still exists and is used by unattended installations. Such domains can still be created at a lower domain functional level.
Oct 25 2014
Microsoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The attack requires user interaction to succeed on Windows clients with a default configuration, as User Account Control (UAC) is enabled and a consent prompt is displayed.
At this time, we are aware of limited, targeted attacks that attempt to exploit the vulnerability through Microsoft PowerPoint.
- n observed attacks, User Account Control (UAC) displays a consent prompt or an elevation prompt, depending on the privileges of the current user, before a file containing the exploit is executed. UAC is enabled by default on Windows Vista and newer releases of Microsoft Windows.
- An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- In a web-based attack scenario, an attacker could host a website that contains a webpage that contains a specially crafted Office file that is used to attempt to exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker’s website.
- Files from the Internet and from other potentially unsafe locations can contain viruses, worms, or other kinds of malware that can harm your computer. To help protect your computer, files from these potentially unsafe locations are opened in Protected View. By using Protected View, you can read a file and see its contents while reducing the risks. Protected View is enabled by default.
Deploy the Enhanced Mitigation Experience Toolkit 5.0 and configure Attack Surface Reduction
The Attack Surface Reduction feature in EMET 5.0 can help block current attacks. You need to add configuration to the standard one in order to be protected.
- Create a new file with the content below:
<EMET Version="5.0.5324.31801"> <Settings /> <EMET_Apps> <AppConfig Path="*" Executable="dllhost.exe"> <Mitigation Name="DEP" Enabled="false" /> <Mitigation Name="SEHOP" Enabled="false" /> <Mitigation Name="NullPage" Enabled="false" /> <Mitigation Name="HeapSpray" Enabled="false" /> <Mitigation Name="EAF" Enabled="false" /> <Mitigation Name="EAF+" Enabled="false" /> <Mitigation Name="MandatoryASLR" Enabled="false" /> <Mitigation Name="BottomUpASLR" Enabled="false" /> <Mitigation Name="LoadLib" Enabled="false" /> <Mitigation Name="MemProt" Enabled="false" /> <Mitigation Name="Caller" Enabled="false" /> <Mitigation Name="SimExecFlow" Enabled="false" /> <Mitigation Name="StackPivot" Enabled="false" /> <Mitigation Name="ASR" Enabled="true"> <asr_modules>packager.dll</asr_modules> </Mitigation> </AppConfig> <AppConfig Path="*\OFFICE1*" Executable="POWERPNT.EXE"> <Mitigation Name="DEP" Enabled="true" /> <Mitigation Name="SEHOP" Enabled="true" /> <Mitigation Name="NullPage" Enabled="true" /> <Mitigation Name="HeapSpray" Enabled="true" /> <Mitigation Name="EAF" Enabled="true" /> <Mitigation Name="EAF+" Enabled="false" /> <Mitigation Name="MandatoryASLR" Enabled="true" /> <Mitigation Name="BottomUpASLR" Enabled="true" /> <Mitigation Name="LoadLib" Enabled="true" /> <Mitigation Name="MemProt" Enabled="true" /> <Mitigation Name="Caller" Enabled="true" /> <Mitigation Name="SimExecFlow" Enabled="true" /> <Mitigation Name="StackPivot" Enabled="true" /> <Mitigation Name="ASR" Enabled="true"> <asr_modules>flash*.ocx;packager.dll</asr_modules> </Mitigation> </AppConfig> </EMET_Apps> </EMET>- Save this file as EMET_CVE-2014-6352.xml.
- From the EMET user interface, click Import from the File ribbon.
- Select the EMET_CVE-2014-6352.xml file and click Open.
- Alternatively, run this command from a Command Prompt with elevated privileges to import the saved script “EMET_CVE-2014-6532.xml” into EMET:
EMET_Conf.exe --import EMET_CVE-2014-6352.xml
Microsoft : https://technet.microsoft.com/library/security/3010060
Oct 21 2014
From Microsoft’s Virtualization Blog, How to install integration services when the virtual machine is not running:
We’ve been talking to a lot of people about deploying integration services (integration components) lately. As it turns out, they’re pretty easy to patch offline with existing Hyper-V tools.
First, why would you update integration services on a not-running (offline) VM?
Offline VM servicing is valuable for VM templates places that create new VMs frequently since it allows you to keep VM templates up-to-date. While this post targets exclusively integration service updates, the same update approach applies to many updates as well as any configurations specific to the environment. Keeping the VM images fully up to date and configured before they are deployed saves significant setup time and support every time a new VM is created.
Here is a detailed write-up about deploying and updating integration services on an offline VM – both VHD/VHDX – using out of box PowerShell tools and a cab (cabinet) file that comes bundled with Server 2008 or later Hyper-V hosts.
Recent Comments