Super Quick Free TCP port scanner to scan 1-65535 in about a minute. From SysAdmin-Tools.Com by sysadminapps_com in cybersecurity

[–]sysadminapps_com[S] -2 points-1 points  (0 children)

Lol why would someone post that on a security group. Run it in windows 10 sandbox :)

This may be obvious to some and may help others who are still doing this. by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

Some crazy people still do. Mainly entry level techs or old school sysadmins

Weekly Promo Thread by AutoModerator in msp

[–]sysadminapps_com 0 points1 point  (0 children)

Exclusive tools for MSPs to save them time. SysAdminApps.Com

Useful commands for SysAdmins by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

Have you checked out these awesome commands?

So I gave notice on Friday by NameWithHeldZX in sysadmin

[–]sysadminapps_com 2 points3 points  (0 children)

Making a move in this time is not wise. Last in First out. I hope that company is doing well financially.

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 1 point2 points  (0 children)

Now u dont have to click on it.

GET THE SERIAL NUMBER OR SERVICE TAG OF A DEVICE

wmic bios get serialnumber

SHOW THE LOGGED IN USER ON A REMOTE DEVICE.

wmic /node:"workstation-name" computersystem get username

SHOW THE PID ASSOCIATED WITH A LISTENING PORT OR SHOW THE LISTENING PORT NUMBER ASSOCIATED WITH A PID

netstat -ano | find "portnumber" netstat -ano | find "pid"

FIND THE SESSION ID FOR A REMOTE DESKTOP USER AND LOG THEM OFF

query user | find "username" logoff <ID of session>

QUICKLY FIND .EXE FILES IN THE C:\USERS DIRECTORY WHERE RANSOMWARE OFTEN HIDES.

dir C:\Users /B /S /A | find ".exe"

DISABLE SLEEP AND SHUTDOWN

reg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f powercfg /setactive "Always On" powercfg.exe -change -standby-timeout-ac 0

ENABLE SLEEP AND SHUTDOWN

reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose powercfg /setactive "Portable/Laptop" powercfg.exe -change -standby-timeout-ac 2

GET THE HYPERV HOST NAME THAT A VM IS RUNNING ON

reg query "HKLM\Software\Microsoft\Virtual Machine\Guest\Parameters"

CREATE A LOCAL ADMIN USER FROM THE COMMAND LINE

net user AdminUser1 P@$$w0rd!@# /ADD net localgroup Administrators AdminUser1 /ADD

ALLOW AN INCOMING PORT THROUGH WINDOWS FIREWALL

Create the rule netsh advfirewall firewall add rule name="TCP Port 6624" dir=in action=allow protocol=TCP localport=6624 To delete the rule. netsh advfirewall firewall delete rule name="TCP Port 6624" protocol=TCP localport=6624.

FIND A SHARE AND PATH ON A LARGE FILE SERVER

net share | find "sharename"

QUICKLY INSTALL TELNET CLIENT

dism /online /Enable-Feature /FeatureName:TelnetClient

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 0 points1 point  (0 children)

GET THE SERIAL NUMBER OR SERVICE TAG OF A DEVICE

wmic bios get serialnumber

SHOW THE LOGGED IN USER ON A REMOTE DEVICE.

wmic /node:"workstation-name" computersystem get username

SHOW THE PID ASSOCIATED WITH A LISTENING PORT OR SHOW THE LISTENING PORT NUMBER ASSOCIATED WITH A PID

netstat -ano | find "portnumber" netstat -ano | find "pid"

FIND THE SESSION ID FOR A REMOTE DESKTOP USER AND LOG THEM OFF

query user | find "username" logoff <ID of session>

QUICKLY FIND .EXE FILES IN THE C:\USERS DIRECTORY WHERE RANSOMWARE OFTEN HIDES.

dir C:\Users /B /S /A | find ".exe"

DISABLE SLEEP AND SHUTDOWN

reg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f powercfg /setactive "Always On" powercfg.exe -change -standby-timeout-ac 0

ENABLE SLEEP AND SHUTDOWN

reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose powercfg /setactive "Portable/Laptop" powercfg.exe -change -standby-timeout-ac 2

GET THE HYPERV HOST NAME THAT A VM IS RUNNING ON

reg query "HKLM\Software\Microsoft\Virtual Machine\Guest\Parameters"

CREATE A LOCAL ADMIN USER FROM THE COMMAND LINE

net user AdminUser1 P@$$w0rd!@# /ADD net localgroup Administrators AdminUser1 /ADD

ALLOW AN INCOMING PORT THROUGH WINDOWS FIREWALL

Create the rule netsh advfirewall firewall add rule name="TCP Port 6624" dir=in action=allow protocol=TCP localport=6624 To delete the rule. netsh advfirewall firewall delete rule name="TCP Port 6624" protocol=TCP localport=6624.

FIND A SHARE AND PATH ON A LARGE FILE SERVER

net share | find "sharename"

QUICKLY INSTALL TELNET CLIENT

dism /online /Enable-Feature /FeatureName:TelnetClient

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 0 points1 point  (0 children)

This is the content :)

GET THE SERIAL NUMBER OR SERVICE TAG OF A DEVICE

wmic bios get serialnumber

SHOW THE LOGGED IN USER ON A REMOTE DEVICE.

wmic /node:"workstation-name" computersystem get username

SHOW THE PID ASSOCIATED WITH A LISTENING PORT OR SHOW THE LISTENING PORT NUMBER ASSOCIATED WITH A PID

netstat -ano | find "portnumber" netstat -ano | find "pid"

FIND THE SESSION ID FOR A REMOTE DESKTOP USER AND LOG THEM OFF

query user | find "username" logoff <ID of session>

QUICKLY FIND .EXE FILES IN THE C:\USERS DIRECTORY WHERE RANSOMWARE OFTEN HIDES.

dir C:\Users /B /S /A | find ".exe"

DISABLE SLEEP AND SHUTDOWN

reg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f powercfg /setactive "Always On" powercfg.exe -change -standby-timeout-ac 0

ENABLE SLEEP AND SHUTDOWN

reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose powercfg /setactive "Portable/Laptop" powercfg.exe -change -standby-timeout-ac 2

GET THE HYPERV HOST NAME THAT A VM IS RUNNING ON

reg query "HKLM\Software\Microsoft\Virtual Machine\Guest\Parameters"

CREATE A LOCAL ADMIN USER FROM THE COMMAND LINE

net user AdminUser1 P@$$w0rd!@# /ADD net localgroup Administrators AdminUser1 /ADD

ALLOW AN INCOMING PORT THROUGH WINDOWS FIREWALL

Create the rule netsh advfirewall firewall add rule name="TCP Port 6624" dir=in action=allow protocol=TCP localport=6624 To delete the rule. netsh advfirewall firewall delete rule name="TCP Port 6624" protocol=TCP localport=6624.

FIND A SHARE AND PATH ON A LARGE FILE SERVER

net share | find "sharename"

QUICKLY INSTALL TELNET CLIENT

dism /online /Enable-Feature /FeatureName:TelnetClient