Okay. More tech. You know, Microsoft has some of the best documentation out there on the internet for their technologies. That said, finding some of it can be a bit brutal, but it does exist. And now so much more shit makes so much more sense now. And I love it. #ActiveDirectory #Windows #Microsoft #WindowsServer
#activedirectory #windows #microsoft #Windowsserver
I am disappointed that openldap (and by extension python-ldap) doesn't support connectionless LDAP. Makes using it in a Windows environment a little more painful. Might have to figure something else out, but for now, what I'm doing works.
#activedirectory #Windowsserver #opensource
Aight Microsoft. You caused me some work today. I had to actually open the laptop on a holiday weekend because of your bum patches. #infosec #activedirectory #windowsserver
#infosec #activedirectory #Windowsserver
If you can't generate new keytabs for some reason, or your platforms don't support AES Kerberos--you can use Set-ADUser/Computer to set the supported encryption types to RC4 on that account--which resolves any Kerberos auth issues after applying the new patch. #windowsserver #infosec #cybersecurity #activedirectory
#Windowsserver #infosec #cybersecurity #activedirectory
With the November Microsoft patches, Microsoft has changed the default Kerberos Session Key encryption to AES-256. The documentation for this flag change in the Kerberos Encryption Types is buried in an errata document that has no indication it's been changed unless you open the errata doc: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/2a32282e-dd48-4ad9-a542-609804b02cc9 #infosec #activedirectory #cybersecurity #windowsserver
#infosec #activedirectory #cybersecurity #Windowsserver
I'll throw this out there. #Windows11 and #WindowsServer are rather great platforms if you care about security, particularly in some of the more obscure situations like firmware attacks and APTs. I'd recommend every #infosec professional spend some quality time learning some of the underlying technology, including their usage of TPM, Secure Boot, Secure Launch, and Defender Application Control. No platform is perfect; But Windows has done some really awesome stuff using hardware security.
#windows11 #Windowsserver #infosec
Microsoft: Attackers Exploiting ‘ZeroLogon’ Windows Flaw https://krebsonsecurity.com/2020/09/microsoft-attackers-exploiting-zerologon-windows-flaw/ #CVE-2020-1472 #WindowsServer #ScottCaveza #microsoft #ZeroLogon #Tenable #Other
#CVE #Windowsserver #ScottCaveza #microsoft #Zerologon #Tenable #Other
Microsoft warns hackers are actively targeting Zerologon vulnerability. Patch pronto! https://grahamcluley.com/microsoft-warns-hackers-are-actively-targeting-zerologon-vulnerability-patch-pronto/ #Vulnerability #vulnerability #Windowsserver #Microsoft #Zerologon #Windows
#vulnerability #Windowsserver #microsoft #Zerologon #windows