Terrapin SSH Vulnerability

Finding the Vulnerability After reading this article, I found that one of my SSH servers was vulnerable to Terrapin attacks.  I downloaded a free scanner and then ran it against the SSH server in question by using the following command: Terrapin_Scanner_Windows_amd64.exe -connect hostname.local After which…

Intune Application Deployments

Application Deployment Types Listed below are the commonly used Intune application types that are deployed. Microsoft Store app (new) When deploying applications, search through the Microsoft store first to see if the application is listed there. The benefit of deploying applications this way is that as the applications are updated…

Creating FAT32 Drive on Linux Host

Partition Drive 1. Run sudo lsblk and find out the device name. 2. Run fdisk /dev/sdX where sdX is the appropriate name. 3. Create a new partition by typing n, and then Enter for the following defaults. 4. To set the partition type, type t , then L. Find W95…

Add Additional Email Address in Exchange Online

Add Additional Email Address in Exchange Online 1. Login to Exchange Online. 2. In the search box at the top, search for the account that will have the additional email address. 3. In the menu on the right, under the General tab, find "Email addresses." 4. Click on the "Manage…

Getting a Suspect Database Back Online

If you are ever in a place where you find your SQL Server database in suspect and the data file and the log file no longer match, you can follow these instructions to attempt to get the database back in an operational state without the log file. Verify that the…

Clear Out Legacy Logon Script Values from AD

Need a way to clear out legacy logon script values from your AD users?  Follow along this guide for some quick PowerShell snippets to assist: -------------------------------------------------------------------------------- First, let's find all users that may have a logon script associated with their user account and export this list to a CSV file…

Auditing GPOs

Wouldn't it be great if you could just export all of your GPOs into a nice simple report rather than clicking through each individual policy within the management console?  Well, there is a way!  Read on for instructions on how to create this report. Install Latest Version of PowerShell If…