Featured Posts Most Popular Posts Latest Posts
Write rieview Rezension schreiben Get Badge! Abzeichen holen! ⚙️Edit profile ⚙️Profil bearbeiten News Neuigkeiten
Tags: featured
So, you want to know how to make money cracking passwords? Well, then, let me point you in the right direction with a warning.
The post Password Cracking for Fun and Profit appeared first on Cyber Gladius.
27.2.2025 15:35Password Cracking for Fun and ProfitIn reply to <a href="https://cybergladius.com/secure-windows-scheduled-tasks-with-managed-service-accounts/#comment-369">Bret</a>. Always read the comments! I started on another site following steps to schedule a task using an sMSA and kept getting the 'filename too long error'. I did a lot of wandering looking for an answer. I was just about to give up when I decided to look through the comments on your article. I had made my sMSA account 16 characters. I have been around enough to know better. A Netbios limitation carried forward from LAN Manager all the way to 2025. Thank you!
29.1.2025 22:29Comment on Secure Windows Scheduled Tasks with Managed Service Accounts by Ron DarlingIn reply to <a href="https://cybergladius.com/secure-windows-scheduled-tasks-with-managed-service-accounts/#comment-451">Mike</a>. Hey Mike, i'm having exactly the same problem and for the same script it seems... No mails are sent to 365 when using a sMSA account, event giving the permissions in AD for domain admin and others, but If I change to my user it runs normally. Any suggestions guys? I'm kind stuck and didn't want to give domain admins permissions to like a generic user for use in it..
9.9.2024 16:47Comment on Secure Windows Scheduled Tasks with Managed Service Accounts by JaironLearn how to quickly Download Private SoundCloud Audio Files by using SoundCloud's API.
The post Download Private SoundCloud Audio Files appeared first on Cyber Gladius.
20.8.2024 01:06Download Private SoundCloud Audio FilesI followed your steps and was able to get all the commands to work. The scheduled task when executes at the trigger time has error 332 use msaAcoount$ not logged in
13.8.2024 01:05Comment on Secure Windows Scheduled Tasks with Managed Service Accounts by ShannonI followed all your steps and created the task without issue. I didnt edit in in GUI. When task ran got error 332 Condition Warning User "MSAAccount$"not logged in. Running server 2022 task executes a EXE.
11.8.2024 21:31Comment on Secure Windows Scheduled Tasks with Managed Service Accounts by Shannonfollowed the instructions but got: [45008]: ERROR Failed to access socket path: /var/run/fail2ban/fail2ban.sock. Is fail2ban running?
24.6.2024 02:14Comment on Linux Server Hardening: Banning Malicious Traffic by puzzle[…] The Immediate Scheduled Task deployment method quickly installs software or runs a PowerShell script on all systems in your environment. However, I recommend you only use it in the short term. Once the initial deployment is complete, you should disable the Immediate Scheduled Task GPO and use the Software Installations or Startup Script GPO methods to maintain deployment on systems added… […]
18.6.2024 17:21Comment on Sysmon Deployment via Active Directory GPO by Fast AD GPO Software Deployment Method - Cyber Gladius[…] Fast Deployment via an Immediate Scheduled Task GPO […]
18.6.2024 17:19Comment on Fast AD GPO Software Deployment Method by Sysmon Deployment via Active Directory GPO - Cyber GladiusHow to deploy Sysmon and keep it up to date at all time. Don't waste your time managing Sysmon, just do this.
The post Sysmon Deployment via Active Directory GPO appeared first on Cyber Gladius.
18.6.2024 17:19Sysmon Deployment via Active Directory GPODo you want to deploy a script or software quickly via Group Policy? Learn the fastest software or script deployment method in Group Policy.
The post Fast AD GPO Software Deployment Method appeared first on Cyber Gladius.
18.6.2024 15:49Fast AD GPO Software Deployment Method[…] you want more tips on securing your data and personal belongings at DEF CON, check out my “The Traveling IT Worker” blog […]
7.6.2024 21:18Comment on The Traveling IT Worker by Guide to Attending DEF CON 32 in 2024 - Cyber GladiusAre you planning on attending DEF CON 32? Check out my guide if this will be your first DEF CON. The helpful tips you need to maximize your DEF CON 32 experience.
The post Guide to Attending DEF CON 32 in 2024 appeared first on Cyber Gladius.
7.6.2024 21:18Guide to Attending DEF CON 32 in 2024A step-by-step guide to building a WinFE bootable live OS ISO file for Incident Response or troubleshooting.
The post Incident Response Plan: Building System Imaging WinFE Tools appeared first on Cyber Gladius.
6.6.2024 21:27Incident Response Plan: Building System Imaging WinFE ToolsDo you have a Data Collection Incident Response Plan? Here is a method to jump-start the process.
The post Incident Response Plan: Windows Data Collection appeared first on Cyber Gladius.
10.5.2024 20:52Incident Response Plan: Windows Data Collection[…] Explaining how the AD ACL works is a topic that requires its own post. I broke off the AD ACL explanation into its own post to keep this blog post from being excessively long. You can read The Active Directory Access Control List Explained here. […]
4.4.2024 02:57Comment on The Active Directory Access Control List Explained by Preventing DCSync Attacks - Cyber GladiusIn reply to <a href="https://cybergladius.com/building-active-directory-groups-for-role-based-access/#comment-456">Paul</a>. Hi Paul, Thanks for reading. That is a good question. I have ran into this issue with a customer's custom built web application a while back. The web-app would only check for AD User objects directly in a group, and ignore the members of a nested group. The custom web-app was using Microsoft Graph REST API(Office 365 SSO) for authentication and authorization. After reviewing the code I found the web-app was using the “/me/memberOf” query to check group membership. To recursively check group membership, we just switch the API call to the “/me/transitiveMemberOf” query; a very simple change(literally used a find/replace). Boom! Nested groups started working. While your scenario will be different, I would recommend reviewing the applications authentication and authorization mechanism. Most apps support Single Sign-On(SSO), and RBAC is not some new concept, so they very likely support it.
3.4.2024 15:59Comment on Building Active Directory Groups For Role-based Access by BretLearn to audit for and prevent DCSync attacks in your Active Directory environment. Most other sources miss more attack paths to DCSync abuse. Find all the DCSync attack paths; if you don't, the Attackers will.
The post Preventing DCSync Attacks appeared first on Cyber Gladius.
3.4.2024 15:31Preventing DCSync AttacksMany Active Directory attacks' root vulnerability is the domain's AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
The post The Active Directory Access Control List Explained appeared first on Cyber Gladius.
21.1.2024 18:49The Active Directory Access Control List ExplainedDive into the IT professional's nomadic journey—conquering ergonomic hurdles and fortifying digital defenses. Uncover essential tips for a seamless blend of work, travel, and security. Your IT adventure begins here!
The post The Traveling IT Worker appeared first on Cyber Gladius.
12.11.2023 16:26The Traveling IT Worker