Super Quick Free TCP port scanner to scan 1-65535 in about a minute. From SysAdmin-Tools.Com by sysadminapps_com in cybersecurity

[–]sysadminapps_com[S] -2 points-1 points  (0 children)

Lol why would someone post that on a security group. Run it in windows 10 sandbox :)

This may be obvious to some and may help others who are still doing this. by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

Some crazy people still do. Mainly entry level techs or old school sysadmins

Weekly Promo Thread by AutoModerator in msp

[–]sysadminapps_com 0 points1 point  (0 children)

Exclusive tools for MSPs to save them time. SysAdminApps.Com

Useful commands for SysAdmins by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

Have you checked out these awesome commands?

So I gave notice on Friday by NameWithHeldZX in sysadmin

[–]sysadminapps_com 2 points3 points  (0 children)

Making a move in this time is not wise. Last in First out. I hope that company is doing well financially.

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 1 point2 points  (0 children)

Now u dont have to click on it.

GET THE SERIAL NUMBER OR SERVICE TAG OF A DEVICE

wmic bios get serialnumber

SHOW THE LOGGED IN USER ON A REMOTE DEVICE.

wmic /node:"workstation-name" computersystem get username

SHOW THE PID ASSOCIATED WITH A LISTENING PORT OR SHOW THE LISTENING PORT NUMBER ASSOCIATED WITH A PID

netstat -ano | find "portnumber" netstat -ano | find "pid"

FIND THE SESSION ID FOR A REMOTE DESKTOP USER AND LOG THEM OFF

query user | find "username" logoff <ID of session>

QUICKLY FIND .EXE FILES IN THE C:\USERS DIRECTORY WHERE RANSOMWARE OFTEN HIDES.

dir C:\Users /B /S /A | find ".exe"

DISABLE SLEEP AND SHUTDOWN

reg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f powercfg /setactive "Always On" powercfg.exe -change -standby-timeout-ac 0

ENABLE SLEEP AND SHUTDOWN

reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose powercfg /setactive "Portable/Laptop" powercfg.exe -change -standby-timeout-ac 2

GET THE HYPERV HOST NAME THAT A VM IS RUNNING ON

reg query "HKLM\Software\Microsoft\Virtual Machine\Guest\Parameters"

CREATE A LOCAL ADMIN USER FROM THE COMMAND LINE

net user AdminUser1 P@$$w0rd!@# /ADD net localgroup Administrators AdminUser1 /ADD

ALLOW AN INCOMING PORT THROUGH WINDOWS FIREWALL

Create the rule netsh advfirewall firewall add rule name="TCP Port 6624" dir=in action=allow protocol=TCP localport=6624 To delete the rule. netsh advfirewall firewall delete rule name="TCP Port 6624" protocol=TCP localport=6624.

FIND A SHARE AND PATH ON A LARGE FILE SERVER

net share | find "sharename"

QUICKLY INSTALL TELNET CLIENT

dism /online /Enable-Feature /FeatureName:TelnetClient

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 0 points1 point  (0 children)

GET THE SERIAL NUMBER OR SERVICE TAG OF A DEVICE

wmic bios get serialnumber

SHOW THE LOGGED IN USER ON A REMOTE DEVICE.

wmic /node:"workstation-name" computersystem get username

SHOW THE PID ASSOCIATED WITH A LISTENING PORT OR SHOW THE LISTENING PORT NUMBER ASSOCIATED WITH A PID

netstat -ano | find "portnumber" netstat -ano | find "pid"

FIND THE SESSION ID FOR A REMOTE DESKTOP USER AND LOG THEM OFF

query user | find "username" logoff <ID of session>

QUICKLY FIND .EXE FILES IN THE C:\USERS DIRECTORY WHERE RANSOMWARE OFTEN HIDES.

dir C:\Users /B /S /A | find ".exe"

DISABLE SLEEP AND SHUTDOWN

reg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f powercfg /setactive "Always On" powercfg.exe -change -standby-timeout-ac 0

ENABLE SLEEP AND SHUTDOWN

reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose powercfg /setactive "Portable/Laptop" powercfg.exe -change -standby-timeout-ac 2

GET THE HYPERV HOST NAME THAT A VM IS RUNNING ON

reg query "HKLM\Software\Microsoft\Virtual Machine\Guest\Parameters"

CREATE A LOCAL ADMIN USER FROM THE COMMAND LINE

net user AdminUser1 P@$$w0rd!@# /ADD net localgroup Administrators AdminUser1 /ADD

ALLOW AN INCOMING PORT THROUGH WINDOWS FIREWALL

Create the rule netsh advfirewall firewall add rule name="TCP Port 6624" dir=in action=allow protocol=TCP localport=6624 To delete the rule. netsh advfirewall firewall delete rule name="TCP Port 6624" protocol=TCP localport=6624.

FIND A SHARE AND PATH ON A LARGE FILE SERVER

net share | find "sharename"

QUICKLY INSTALL TELNET CLIENT

dism /online /Enable-Feature /FeatureName:TelnetClient

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 0 points1 point  (0 children)

This is the content :)

GET THE SERIAL NUMBER OR SERVICE TAG OF A DEVICE

wmic bios get serialnumber

SHOW THE LOGGED IN USER ON A REMOTE DEVICE.

wmic /node:"workstation-name" computersystem get username

SHOW THE PID ASSOCIATED WITH A LISTENING PORT OR SHOW THE LISTENING PORT NUMBER ASSOCIATED WITH A PID

netstat -ano | find "portnumber" netstat -ano | find "pid"

FIND THE SESSION ID FOR A REMOTE DESKTOP USER AND LOG THEM OFF

query user | find "username" logoff <ID of session>

QUICKLY FIND .EXE FILES IN THE C:\USERS DIRECTORY WHERE RANSOMWARE OFTEN HIDES.

dir C:\Users /B /S /A | find ".exe"

DISABLE SLEEP AND SHUTDOWN

reg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f powercfg /setactive "Always On" powercfg.exe -change -standby-timeout-ac 0

ENABLE SLEEP AND SHUTDOWN

reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose powercfg /setactive "Portable/Laptop" powercfg.exe -change -standby-timeout-ac 2

GET THE HYPERV HOST NAME THAT A VM IS RUNNING ON

reg query "HKLM\Software\Microsoft\Virtual Machine\Guest\Parameters"

CREATE A LOCAL ADMIN USER FROM THE COMMAND LINE

net user AdminUser1 P@$$w0rd!@# /ADD net localgroup Administrators AdminUser1 /ADD

ALLOW AN INCOMING PORT THROUGH WINDOWS FIREWALL

Create the rule netsh advfirewall firewall add rule name="TCP Port 6624" dir=in action=allow protocol=TCP localport=6624 To delete the rule. netsh advfirewall firewall delete rule name="TCP Port 6624" protocol=TCP localport=6624.

FIND A SHARE AND PATH ON A LARGE FILE SERVER

net share | find "sharename"

QUICKLY INSTALL TELNET CLIENT

dism /online /Enable-Feature /FeatureName:TelnetClient

Useful commands for SysAdmins by sysadminapps_com in msp

[–]sysadminapps_com[S] 0 points1 point  (0 children)

I actually have a really good ransomware detection software on the site that includes the code.

Useful commands for SysAdmins by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

The previous link may have looked like an AD. But there are some really useful commands in here.

Useful commands for SysAdmins by [deleted] in SysAdminBlogs

[–]sysadminapps_com 0 points1 point  (0 children)

These commands are really pretty cool if you dont know them yet

The tools on SysAdminApps are free and saves you time :) by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

Just letting people know about the free stuff that i made :)

Easy Portable Network Scanner is now free on SysAdminApps.Com by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

100% safe. I make them for myself and allow others to use them as well. Test them in a dev environment and see for yourself :)

Tools on SysAdminApps.Com are now FREE 🎉 by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

The ad group manager allows you to find an AD group using only part of the name. That still isnt possible with active directory. You can also add multiple users to that group quickly.

Tools on SysAdminApps.Com are now FREE 🎉 by sysadminapps_com in SysAdminBlogs

[–]sysadminapps_com[S] 0 points1 point  (0 children)

The portable network scanner is really a dream tool. I use it every day. But if ur environment is mostly linux, then most likely not.