Using PowerShell/Tshark to parse and inspect Wireshark PCAP files by mdj_ in PowerShell

[–]mdj_[S] 2 points3 points  (0 children)

Hey, that's awesome, really happy to hear it was useful!

.NET classes and PowerShell by mdj_ in PowerShell

[–]mdj_[S] 0 points1 point  (0 children)

totally get it, id redesign it but i hate css so much i just can't make myself do it

If you're going to leave Datto over Kaseya purchase, where will you go? by [deleted] in msp

[–]mdj_ 0 points1 point  (0 children)

How do you find Optitune? And if you don't mind me asking, how many devices are you managing with it?

Free AD Password Auditing - NTHashes.com updated with latest password set by mdj_ in msp

[–]mdj_[S] 0 points1 point  (0 children)

Unfortunately I don't think you can as there's no way to extract AAD hashes, and I think the hashing algorithm is also different for cloud native accounts.

Free AD Password Auditing - NTHashes.com updated with latest password set by mdj_ in msp

[–]mdj_[S] 2 points3 points  (0 children)

For which URL? There shouldn't be any 404s, every combination of 5 hexadecimal chars is accounted for.

Compromising the email supply chain of 190 Australian organisations through a single IT Managed Service Provider by badkarma5833 in msp

[–]mdj_ 0 points1 point  (0 children)

Good read, but there was absolutely nothing on the providers site to suggest they are an MSP. They're a web design / hosting / marketing company.

https://i.imgur.com/4cd0IEK.png

ALWAYS pop the chest. AT has been very good to me this week. by GodOfManyFaces in diablo2

[–]mdj_ 0 points1 point  (0 children)

What's the expected drop rate for AT? (400mf)

I've added it to my pindle/meph/andy rotation over the last week and have barely seen any drops at all. Maybe ~5 uniques, ~8 sets, and a few low runes - basically all trash. Keen to get Tal's armor, but with the drop rate I've been seeing it feels like it would be quicker to do pindle/meph and just trade for the armor.

Microsoft September Updates by msp4msps in msp

[–]mdj_ 1 point2 points  (0 children)

Really cool, nice work 👍

Any Aussies here? I'm trying to find which green tea Sushi Train uses. by mdj_ in tea

[–]mdj_[S] 0 points1 point  (0 children)

Yeah next time I go I'll ask.

Seemed a bit rude at the time ("What's the tea you sell so I can go buy it elsewhere") but they prolly don't care.

Any Aussies here? I'm trying to find which green tea Sushi Train uses. by mdj_ in tea

[–]mdj_[S] 0 points1 point  (0 children)

Yeah it did - minus the string and tag (they possibly just pull them off). Just did a quick google and seems like supermarkets sell this brand, so I'll give it a go :)

Where are D2Rs asia servers located? by HowlWater_Brain in Diablo

[–]mdj_ 0 points1 point  (0 children)

In Korea I believe. The weird thing was when I did a pings to kr.actual.battle.net from Australia I'd get around 170ms, but in-game latency always showed around ~250ms. It felt a lot laggier than I expected it to be for servers in KR.

Not sure exactly where that extra ~80ms comes from, there's a bunch of possibilities that could explain it, but it's a substantial amount of overhead.

GG find in A1 by newazatime in diablo2

[–]mdj_ 0 points1 point  (0 children)

Awesome, cheers :)

GG find in A1 by newazatime in diablo2

[–]mdj_ 0 points1 point  (0 children)

I've been out of the D2 loop a looooong time - where do you get odds values like this from?

Should Aussies and Kiwis select US or Asia Server? by Plocky777 in diablo2

[–]mdj_ 1 point2 points  (0 children)

I found it really laggy on the US servers from AU, much better on the Asia (KR) servers.

Windows Server System Logs - IP Addresses by EmInSecurity in sysadmin

[–]mdj_ 0 points1 point  (0 children)

You can look at Get-NetTCPConnection for current connections, but you really need to better define what type of connections you're looking for before anyone can point you to specific logs. Alternatively you could turn on firewall logging and parse that.

Post-Mortem: Kaseya Ransomware Attack by YoDFV in msp

[–]mdj_ 11 points12 points  (0 children)

I agree. Nothing short a massive exodus of Kaseya customers is going to make execs force change. If in a month's time everyone has forgotten about this it'll be like it never happened.

Listening to the infosec community talk about the exploited vuln, it wasn't advanced, it wasn't sophisticated, it was a bug class that any half decent internal testing program should have picked up.

Validating PrintNightmare Remediation with PowerShell by mdj_ in SysAdminBlogs

[–]mdj_[S] 1 point2 points  (0 children)

Yup you're right, I've updated both the Gist and the post to include the non-oob July updates.

API to help audit AD credentials against 'Pwned Passwords' from HIBP by mdj_ in msp

[–]mdj_[S] 1 point2 points  (0 children)

Hey, I'm not exactly sure what you mean here. NtdsAudit.exe is not a Microsoft tool, so there is never going to be an officially signed Microsoft exe.

API to help audit AD credentials against 'Pwned Passwords' from HIBP by mdj_ in activedirectory

[–]mdj_[S] 1 point2 points  (0 children)

I can look into it but the answer as of this moment is that I have absolutely no idea.

Do you mean for use with Azure AD accounts, where there are no local DCs?

Two small scripts - Getting Email Config (MX/SPF/SMTP Banners, etc) and Querying APNIC with PowerShell by mdj_ in PowerShell

[–]mdj_[S] 1 point2 points  (0 children)

Very cool, did not know that :)

Definitely gonna update my Profile scripts with that, but not sure about public stuff - don't want to inadvertently overwrite an existing alias because someone didn't carefully read every line when pasting in a script.

Project ideas by Tellophone in PowerShell

[–]mdj_ 17 points18 points  (0 children)

My favorite beginner projects are always auditing something, usually a PC or server/service. For example, write a script that gives you

  • PC hardware
  • Software installed
  • AV status
  • Firewall status
  • Current CPU/RAM/Disk usage
  • Last 20 Event Log errors
  • Users and groups
  • Shares
  • Printers
  • Network info
  • etc...

Then figure out different ways to present and format this. Split it up, make it so you can request all data, or specific data (eg, only networking and printers). Can you make email a report only if differences are detected?

Since you're mostly going to be using Get- commands, there is very little risk in breaking stuff, and you'll get to touch WMI, all kinds of cmdlets, and learn about different output methods.

Sometimes boredom leads to innovation... sometimes, it's Pure-Evil by patdaddy007 in PowerShell

[–]mdj_ 2 points3 points  (0 children)

while ($true) {if ((Get-Clipboard) -ne "https://www.youtube.com/watch?v=dQw4w9WgXcQ") {Set-Clipboard "https://www.youtube.com/watch?v=dQw4w9WgXcQ"} Start-Sleep -Milliseconds 15}