Do your end-users forget to change their passwords before they travel? Did their domain password expire? Don’t compromise your security by communicating a new password across insecure channels. Use the AD Password Extender to extend your user’s password expiration when they are traveling without changing their password.
Storing your Bitlocker Recovery Passwords in Active Directory? Now you can easily audit them! AD Bitlocker Password Audit gives you a quick overview of the status of your current password recovery capabilities.
Calculate file integrity by calculating cryptographic hashes using an Explorer-like interface. Hash Calculator supports multiple popular hashing algorithms such as MD5, SHA1, and SHA2 (256, 384, and 512) and features single and multiple file calculations. Export your results to Microsoft Excel, Acrobat PDF, and multiple other industry formats.
AD Audit is a free Windows tool for auditing your Active Directory. With it’s unique user interface and an information centric approach, auditing your Active Directory just became a lot easier.
AD Bitlocker Password Audit is a free Windows tool for querying your Active Directory for all or selected computer objects and returning their recovery password in a grid-view format giving you a quick overview of the status of your current password recovery capabilities.
AD Password Extender is a free Windows tool that allows you to select a user account and extend the password expiration date by the amount of days specified in your Group Policy. This is often helpful when you have end-users who are traveling and can’t log into the VPN or other Active Directory authenticated system.
AD Ping is a free fast multi-threaded ICMP Ping utility for Windows that features Active Directory integration. Query and ping your Active Directory computers, servers, and domain controllers and determine which computer objects on your domain are online, offline, or no longer in DNS.
If you can’t imagine the risk, you can’t manage it!
I recently became interested in the great open-source SIEM solution from AlienVault (OSSIM), but after the initial installation of OSSIM 4.4.1 it quickly became evident that I was unable to run vulnerability scans. Scans would fail after less than a minute and I was getting error messages such as “Unable to connect to the vulnerability scanner. If the system has been updated recently the vulnerability scanner is rebuilding its database. Please wait a few minutes.” After continuing my research online I came across a solution that worked well, so I wanted to share the steps here.
The Tampa Bay security scene has been pretty uneventful the past few years. But, that is quickly changing. We are about to see the kick-off of the very first BSides Tampa security conference on Saturday, February 15th. If you are into security you owe it to yourself to attend. I’m looking forward to hearing the legendary The Cheshire Catalyst speak about the History of Phone Phreaking, Nick Popovich on Enterprise Active Directory Password Auditing, and Joe Partlow speak about Advanced SIEM and Anti-SIEM Techniques. See you there!
As Malwarebytes, Systems Center Endpoint Protection, and other anti-malware solutions are working hard to keep up with Cryptolocker variants there are some supplemental steps you can take to detect infections and preserve the list of encrypted files. While the anti-malware clients goal is to detect and eliminate the threat, the purpose of this script is to detect machines that have been infected so that you can extract and preserve the list of encrypted files to aid in backup recovery efforts.
This evening I decided to take a look at my site’s login/logoff logs to see if there were anything interesting going on. Not surprisingly there are a lot of people who have tried to log into my site, repeatedly.
If you are interested in the ISO 27001 and ISO 27002 standards and curious about the new 2013 edition you may want to check out this webinar on Friday the 11th of October at 10am ET (or 15:00 GMT) appropriately titled: ISO27001:2013 Transition Masterclass Webinar with Steve Watkins. Steve is the Chair of the ISO27001 user group and UKAS advisor on ISO27001 and he is the co-author, together with Alan Calder, of the book IT Governance: A Manager’s Guide to Data Security and ISO27001/ISO27002
Tom Andreas Mannerud is an Information Technology Manager, Information Security Technologist, Security Researcher, Educator, and Software Author living in beautiful Tampa, Florida. He has managed Information Technology departments both on land and at sea for international corporations with experience leading and working with multi-national teams. He is a member of FBI InfraGard and the Information Systems Security Association. Tom Andreas earned his Master of Science in Information Security and Assurance from the prestigious Western Governors University and his Bachelor of Science in Management Information Systems from the University of South Florida. He maintains numerous professional certifications ranging from the rare Certified Internet Business Strategist to the world famous GIAC Certified ISO-27000 Specialist, Certified Ethical Hacker and Computer Hacking Forensic Investigator in addition to other professional certifications from vendors such as Cisco, CIW, SANS GIAC, EC-Council, and Novell. Tom Andreas have tutored and taught at corporate training centers and colleges. He is also the founder of Mannerud on Security, an outlet for his security research and security software. He is often seen contributing with his information security, digital forensics, and security awareness commentary in various online media and discussion forums both here in the United States and overseas.