Audit your Bitlocker Password Recovery Capabilities

Storing your Bitlocker Recovery Passwords in Active Directory? Now you can easily audit them! AD Bitlocker Password Audit gives you a quick overview of the status of your current password recovery capabilities. Supports computers with multiple keys, including Bitlocker to Go

 

Learn More

Help, I am on the road and I can't log into the VPN!

Do your end-users forget to change their passwords before they travel? Did their domain password expire? Don’t compromise your security by communicating a new password across insecure channels. Use the AD Password Extender to extend your user’s password expiration when they are traveling without changing their password.

 

Learn More

Verify File Integrity with Hash Calculator

Calculate file integrity by calculating cryptographic hashes using an Explorer-like interface. Hash Calculator supports multiple popular hashing algorithms such as MD5SHA1, and SHA2 (256, 384, and 512) and features single and multiple file calculations. Export your results to Microsoft Excel, Acrobat PDF, and multiple other industry formats.

 

Learn More

AD Audit

AD Audit is a free Windows tool for auditing your Active Directory. With it’s unique user interface and an information centric approach, auditing your Active Directory just became a lot easier.

 

AD Bitlocker Password Audit

AD Bitlocker Password Audit is a free Windows tool for querying your Active Directory for all or selected computer objects and returning their recovery password in a grid-view format giving you a quick overview of the status of your current password recovery capabilities.

AD Password Extender

AD Password Extender is a free Windows tool that allows you to select a user account and extend the password expiration date by the amount of days specified in your Group Policy. This is often helpful when you have end-users who are traveling and can’t log into the VPN or other Active Directory authenticated system.

AD Ping

AD Ping is a free fast multi-threaded ICMP Ping utility for Windows that features Active Directory integration. Query and ping your Active Directory computers, servers, and domain controllers and determine which computer objects on your domain are online, offline, or no longer in DNS.

If you can’t imagine the risk, you can’t manage it!

 

—Tom Andreas Mannerud

Improved Bitlocker Auditing

Both the AD Bitlocker Password Audit utility (v1.1) and the more comprehensive AD Audit software (v1.1) have been updated to include improved Bitlocker auditing. The new versions now support computer objects with multiple associated Bitlocker keys.

Unable to run Vulnerability Scans after installing or upgrading AlienVault OSSIM

I recently became interested in the great open-source SIEM solution from AlienVault (OSSIM), but after the initial installation of OSSIM 4.4.1 it quickly became evident that I was unable to run vulnerability scans. Scans would fail after less than a minute and I was getting error messages such as “Unable to connect to the vulnerability scanner. If the system has been updated recently the vulnerability scanner is rebuilding its database. Please wait a few minutes.” After continuing my research online I came across a solution that worked well, so I wanted to share the steps here.

BSides Tampa

The Tampa Bay security scene has been pretty uneventful the past few years. But, that is quickly changing. We are about to see the kick-off of the very first BSides Tampa security conference on Saturday, February 15th. If you are into security you owe it to yourself to attend. I’m looking forward to hearing the legendary The Cheshire Catalyst speak about the History of Phone Phreaking, Nick Popovich on Enterprise Active Directory Password Auditing, and Joe Partlow speak about Advanced SIEM and Anti-SIEM Techniques. See you there!

VBScript: Detect and Preserve Cryptolocker Registry Key

As Malwarebytes, Systems Center Endpoint Protection, and other anti-malware solutions are working hard to keep up with Cryptolocker variants there are some supplemental steps you can take to detect infections and preserve the list of encrypted files. While the anti-malware clients goal is to detect and eliminate the threat, the purpose of this script is to detect machines that have been infected so that you can extract and preserve the list of encrypted files to aid in backup recovery efforts.

Protecting your WordPress Site

This evening I decided to take a look at my site’s login/logoff logs to see if there were anything interesting going on. Not surprisingly there are a lot of people who have tried to log into my site, repeatedly.

About the Author

Tom Andreas Mannerud is an Information Technology Manager, Information Security Technologist, Security Researcher, Educator, and Software Author living in beautiful Tampa, Florida. He has managed Information Technology departments both on land and at sea for international corporations with experience leading and working with multi-national teams. He is a member of FBI InfraGard and the Information Systems Security Association. Tom Andreas earned his Master of Science in Information Security and Assurance from the prestigious Western Governors University and his Bachelor of Science in Management Information Systems from the University of South Florida. He maintains numerous professional certifications ranging from the rare Certified Internet Business Strategist to the world famous GIAC Certified ISO-27000 Specialist, Certified Ethical Hacker and Computer Hacking Forensic Investigator in addition to other professional certifications from vendors such as Cisco, CIW, SANS GIAC, EC-Council, and Novell. Tom Andreas have tutored and taught at corporate training centers and colleges. He is also the founder of Mannerud on Security, an outlet for his security research and security software. He is often seen contributing with his information security, digital forensics, and security awareness commentary in various online media and discussion forums both here in the United States and overseas.