Powershell is well documented everywhere on the web, but I often find myself having to google simple things that I’ve done in the past. Instead, I’ll just put them in here for quick reference for myself! Export all users in a specific OU to a .csv $OUPath = ‘OU=FTE,OU=<OU>,DC=<DC>,DC=com’$ExportPath = ‘C:\temp\users.csv’Get-ADUser -Filter * -SearchBase $OUPathContinue reading “Simple Powershell Scripts pt.1”
Author Archives: joshnck
Analyzing and Explaining the SUNBURST Vulnerability CVE-2020-14005 – SolarWinds Network Performance Monitor ExecuteExternalProgram Command Injection Remote Code Execution Vulnerability
Section 1: Analysis of the flaw The SUNBURST vulnerability is a supply chain attack that created an evasive backdoor into the systems of numerous global entities. An infamous group of hackers known as ATP29 or ‘Cozy Bear’, members of the Russian GRU, are believed to be behind the attack but organizations like FireEye have notContinue reading “Analyzing and Explaining the SUNBURST Vulnerability CVE-2020-14005 – SolarWinds Network Performance Monitor ExecuteExternalProgram Command Injection Remote Code Execution Vulnerability”
Section 230 and Social Media censorship
Section 230 of the US Code is a controversial piece of legislation. At the core of the code, it was written to provide the websites that host user-created content the ability to moderate their content without facing civil liability for censorship. The intention here is to provide these mediums the ability to remove lewd orContinue reading “Section 230 and Social Media censorship”
Getting Started with RFID hacking
Once you start looking, you will see RFID access control devices everywhere. These devices, when paired with an electrified lock and an access control card, will allow security teams the ability to restrict access to authorized personnel. This is great security – only authorized cards are able to gain access to these doors and oftenContinue reading “Getting Started with RFID hacking”
The SolarWinds Hack
Along with the rest of the cyber security world, I’ve been thinking a lot about the compromise of the SolarWinds network. The implications behind this attack are endless and it is unlikely that we will every know the full details. Some sources have said that up to 18,000 SolarWinds customers have been compromised in thisContinue reading “The SolarWinds Hack”