Recreating a windows profile used to be as easy as just renaming the old profile, then rebooting the PC and logging in[…]
Read moreDelete Stale or Inactive Computer Accounts from Active Directory
I recentley found this post from Santhosh Sivarajan’s blog which gives you an easy way to identify and delete inactive[…]
Read moreTesting Email Connections with Telnet
This is one of the essential troubleshooting tricks that an Exchange administrator needs to know, sending an email using telnet[…]
Read moreSecure Shell (SSH)
Secure Shell or SSH is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote[…]
Read more
Restrict RDP Access by IP Address with Windows Firewall
You can restrict RDP access to your server, either by IP address or a range of IP addresses, using the[…]
Read moreSync Time from an External Time Source
This is a quick post to how to sync your domain controllers with an external time source (0.uk.pool.ntp.org). By default,[…]
Read moreSetup a Hacking lab
One of main problems I found when starting to hack was finding vulnerable targets to attack and hone your skills, these targets can[…]
Read moreNMap 101
NMap short for Network Mapper is as the name suggests a tool used for mapping a network, but one of[…]
Read moreMagic Unicorn V 2.0 PowerShell Downgrade Attack
Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory based on[…]
Read moreNetcat 101
I hear a lot about Netcat being a Swiss army knife for TCP/IP and i wanted to find out, what[…]
Read more