CionSystems Archives - ADSploit https://adsploit.com/category/cionsystems/ Powered by CionSystems inc Wed, 29 Jun 2022 14:30:08 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://adsploit.com/wp-content/uploads/2022/08/icon-36x36.png CionSystems Archives - ADSploit https://adsploit.com/category/cionsystems/ 32 32 Performing Active Directory Security Review https://adsploit.com/performing-active-directory-security/ Mon, 06 Jun 2022 11:38:46 +0000 https://cionsystems.com/?p=7272 Download the ADMustcheckReports.ps1 script below. You can download the Free Script from here . Note: You will need to extract the .ps1 after downloading the zip file, please review the help file. The CionADChecks.ps1 is a PowerShell scripts gathers basic data from AD Domain/forest that we believe enterprises must review on a regular basis and take […]

The post Performing Active Directory Security Review appeared first on ADSploit.

]]>
Download the ADMustcheckReports.ps1 script below.

You can download the Free Script from here .


Note: You will need to extract the .ps1 after downloading the zip file, please review the help file.

The CionADChecks.ps1 is a PowerShell scripts gathers basic data from AD Domain/forest that we believe enterprises must review on a regular basis and take necessary actions to remediate any weakness. You can further use CionSystems’ Free AD reporter for detailed AD assessment.

The PowerShell script requires the following:

  • PowerShell 5.0 (minimum)
  • Windows 7+ or Windows Server 2008 (or newer)
  • Active Directory PowerShell Module
  • Group Policy PowerShell Module

The PowerShell script gathers domain data using the Active Directory PowerShell & Group Policy modules and displays some results on the screen. The data shown on the screen is also saved to a transcript log file and all captured data is also saved to csv/text files in c:\temp\ADMustcheckReports.

The ADMustcheckReports PowerShell script gathers data for key AD security items in a domain:

  • User Account Issues
  • Groups
  • Trusts
  • Duplicate SPNs
  • Group Policies
  • AD Administration & Privileged Accounts
  • KRBTGT Account
  • Kerberos Delegation
  • Group Policy Object Owners
  • Much more…
    # What is it? Recommendations
    1 User Account Issues

    There are several potential issues that Active Directory domain user accounts may have because these accounts can be configured in many different ways. Further they can be in different states with different user access control settings. The script shows the state of all users along with

    User accounts flags.

    • Disable and eventually delete inactive accounts. You must look at all domain controllers to figure out the inactive users as last login attributes are not replicated between dcs.
    • Remove the following from accounts:

    ·         Reversible Encryption

    ·         Password Not Required

    ·         Password Never Expires

    ·         DES Kerberos Encryption Enabled

    ·         Do not require Kerberos Pre-Authentication

    ·         Review accounts configured with SID History and clean up SIDs in SID History for accounts from domains that no longer have trusts configured with them.

    2 Domain Password Policy

    The Domain Password policy determines how passwords are created and how often they need to be changed, etc. The AD default password minimum is 7 characters. Most AD environments we see have this set to between 8 and 10. Some are set to 0 or 3 or 5.

    Password Spray attacks are effective against Active Directory due to bad passwords (often with short minimum requirements).Increasing password length can limit Password Spray effectiveness. Fine-Grained Password Policies (FGPP) provides additional flexibility, especially for admin and service accounts.

    You can use CionSystems ADGuardian password protection to audit all passwords, enhance default AD password policies, remove duplicate passwords, force all users to change passwords if they are using passwords that has been breached
    3 Tombstone Lifetime

    The AD Tombstone Lifetime determines how long deleted items exist in AD before they are purged. The default value is 180 days starting with new AD forests created with Windows 2003 SP1. While the tombstone lifetime directly affects deleted items, it also has an impact on Domain Controllers. If a DC hasn’t replicated within the tombstone lifetime with another DC, it is effectively orphaned from the domain. Additionally, DC backups are only useful for restoring AD data within this tombstone lifetime – a backup that is 181 days old is no longer useful when the tombstone lifetime is 180 days.

    Systems state DC backups are only useful for restoring AD data within this tombstone lifetime – a backup that is 181 days old is no longer useful when the tombstone lifetime is 180 days.
    3 Active Directory Backups

    Microsoft supported backups update a partition attribute to identify the last backup date for that partition.

    Unlike CionSystems ADGuardian plus, not all backup solutions of Active Directory set this attribute since they are likely not using a Microsoft supported method.
    4 Trusts

    An Active Directory trust extends the security boundary and include other the systems that may not be in the domain yet they can access resources within the domain, thereby extending the authentication boundary.

    • Review trust configuration & ensure that trusts are appropriate at least once every month.
    • Review bidirectional trusts.
    • Check if trusts is needed with DMZ environments otherwise remove.
    • See if Selective Authentication works for your need.
    5 Active Directory Duplicate Service Principal Names (SPNs) Make sure there are no duplicates!

     

    6 Group Policy Preference Passwords

    Group Policy Preferences was released in the 2008 time-frame and included capability to provide and update credentials. These credentials were encrypted using AES256 which sounds good until you realize that a static key is used to encrypt them. The cpassword value in the GPP xml files is the encrypted password. Using a PowerShell function from PowerSploit, we can reverse this encryption and get the plain-text value. Since authenticated users have read access to Group Policies in the SYSVOL share on all DCs, anyone can view this information and get the passwords stored in GPP xml files, even across trusts.

    • Ensure there are no Group Policy Preference passwords in SYSVOL.

     

    7 Active Directory Admin Account Checks

    During standard Active Directory Security Assessment, the focus must be on identifying “AD Admins” which includes members of the domain Administrators group, Domain Admins, Enterprise Admins, and other builtin groups etc. These accounts have full AD rights and require careful protection. Note, there may be other accounts with privilege access that may not show up in this list, if the access was granted using ACL’s modification

    • Ensure passwords change regularly (every year)
    • Disable inactive account
    • Remove disabled accounts
    • Ensure no SPNs on accounts associated with people
    • Remove any computer accounts
    • Scrutinize Service Accounts
    • What do they do?
    • Where do they run?
    • What computers do they authenticate to?
    • What rights are actually required?
    8 AD Admin Accounts Not Member of Protected Users

    Protected Users is a new group created when the domain PDC Emulator is running Windows Server 2012 R2. Full Domain protection is only available when the domain functional level is 2012 R2.

    Protected Users group provides additional protections:

     

    • Kerberos AES authentication only (No Kerberos DSE/RC4 or NTLM)
    • No Kerberos delegation (constrained or unconstrained)
    • Kerberos TGT set to 4 hours
    • Credential delegation (CredSSP) will not cache the user’s plain text credentials
    • NTLM will not cache the user’s plain text credentials or NT one-way function
    • Offline sign-in is not supported
    9 AD Admins with Old Passwords

    AD Admin accounts with old passwords, especially those older than 3 months, are vulnerable to password spraying (and password guessing).

    • Ensure privileged account passwords change regularly. Use CionSystems password protection enhancer!
    • Older passwords are typically poor and easier to guess.
    • Password Spraying & Kerberoasting are popular attack methods for compromising accounts lacking strong passwords.
    10 AD Admins with Kerberos Service Principal Names (SPNs)

    Kerberos Service Principal Name or SPN is effectively the signpost that points to the service account for a service on a server that supports Kerberos authentication. When the client needs to connect to a service, it must request a Kerberos service ticket from a DC and in order to do this it needs to provide a SPN for that service. The DC looks up the account in the AD forest that has that SPN, identifies the account, and uses the account’s password data to encrypt the ticket. Once the service ticket is delivered to the service, it attempts to open the service ticket and if it can, it can assume the DC provided it, so it validates access for the user.

    • Ensure that no AD Admin accounts associated with people have SPNs.
    • Limit service account membership in privileged Active Directory groups and ensure these service account passwords are longer than 25 characters
    • Enhance password policies using CionSystems Password protection solution

     

    11 Check Default Domain Administrator Account for Issues
    • The account password should change at least every month (and when an AD Admin leaves the organization).
    • Ensure the account has no SPNs.
    • Account should be rarely used which is not the case in most enterprises
    • The account can be enabled or disabled.
    12 Review AD Default/Built-In Group Membership

    Reviewing the default privileged groups in Active Directory is important to identify accounts with high-level privileges.

    • Leave only accounts that must require full AD rights are members of these groups. Use CionSystems ADGuardian to reduce the privilege accounts.
    13 Default AD Groups: Administrators Default Rights:

    • Active Directory admin rights (for the domain)
    • Domain Controller admin rights (for the domain)

    Reference:

    https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-admins

    14 Default AD Groups: Domain Admins Default Rights:

    • Membership in the domain Administrators group which provides most rights.
    • Active Directory admin rights (for the domain)
    • Domain Controller admin rights (for the domain)
    • Default rights on all domain Group Policies
    • Default local Administrator on all domain-joined computers

    Reference:

    https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-domainadmins

    15 Default AD Groups: Enterprise Admins Default Rights:

    • Membership in every domain Administrators group which provides most rights.
    • Active Directory admin rights (in every forest domain)
    • Domain Controller admin rights (in every forest domain)
    • Default rights on all domain Group Policies
    • This group should remain empty in a single domain forest and membership very limited in a multi-domain forest.

    Reference:

    https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-entadmins

    16 Default AD Groups: Server Operators This group is effectively “Domain Controller Admins” and members of this group should be scrutinized at a similar level to Domain Admins. This group has no default members.

    Default Rights:

    • Default rights on Domain Controllers:

    ·         Log on locally

    ·         create and delete shared resources

    ·         start and stop some services

    ·         backup and restore files

    ·         format the hard disk

    ·         shut down the computer

    Reference:

    https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-serveroperators

    17 Default AD Groups: Account Operators This group has no default members. This group should remain empty.

    Default Rights:

    • This group has rights to most objects in the domain (users, groups, computers, etc).

    Microsoft recommends this group remain empty.

    PowerShell Sample Code & Results:

    Get-ADGroupMember ‘Account Operators’

    Reference https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-accountoperators

    18 Privileged Group: VMWare Admins Many enterprises have “VMWare Admins” or other such groups.

     

    • Ensure that “admin” groups only contain admin accounts.
    • Ensure that VMWare Admins follow privileged account best practices:

    ·         Use separate admin accounts

    ·         Use admin workstations

    ·         Passwords change about once a year

    19 Krbtgt Password Not Changed Recently

    The krbtgt account is the domain service account. This account is disabled but used for Kerberos Tickets. The password set when created & practically never changes. DC/AD backups contains the KRBTGT account password. If an attacker gains knowledge of this password, they can create Golden Tickets!

    • Change this password every year (DoD STIG requirement)
    • Change after AD admins leave

    Reference:

    20 Kerberos Delegation

    Kerberos Delegation Types:

    • Unconstrained: Impersonate users connecting to service to ANY Kerberos service.
    • Constrained: Impersonate authenticated users connecting to service to SPECIFIC Kerberos services on servers.
    • Constrained with Protocol Transition: Impersonate any user to SPECIFIC Kerberos services on servers. (aka “Kerberos Magic”)

    Resource-based Constrained Delegation: Enables delegation configured on the resource instead of the account

    • Set all AD Admin accounts to: “Account is sensitive and cannot be delegated”
    • Add all AD Admin accounts to the “Protected Users” group (Windows 2012 R2 DCs).
    • Ensure service accounts with Kerberos delegation have long, complex passwords (preferably group Managed Service Accounts).
    • Remove delegation from accounts that don’t require it.
    • Don’t use Domain Controller SPNs when delegating.
    • Work to shift accounts with unconstrained delegation to constrained.
    • Restrict & monitor who has the ability to configure Kerberos delegation.
    21 GPO Permissions: Review Owners

    Group Policy Objects (GPO) has owners which are able to change permissions. Typically when an account creates a GPO, the account that created has delegate modify rights and it is configured as the owner.

    • Ensure all GPO owners are set to Domain Admins or Enterprise Admins, especially GPOs linked to the domain root and Domain Controllers OU.
    22 Review Domain Permissions

    Domain permissions should be reviewed to ensure that configuration is appropriate. Security of the domain often depends on proper domain permissions.

    • Review domain root permissions with special attention paid to any non-default admin groups (Domain Admins, domain Administrators, Enterprise Admins, etc) with GenericAll (Full Control), WriteDACL (change permissions), write property (modify), and ExtendedRights.
    • Ensure that the domain root owner is configured to Domain Admins or Enterprise Admins.
    23 Domain Controllers Running Old Versions

    Domain Controllers must be running Microsoft supported Windows versions. You can run all Windows Server 2012 R2 DCs even with older Windows Server versions in the domain (note that some testing to ensure Windows 2003/XP works with the new DCs, especially for SMB shares).

     

    All DCs should be running a minimum of Windows Server 2012 R2, preferably 2016/2019. If all DCs are not running 2012 R2 with 2012R2 DFL, Protected Users group doesn’t have full domain protection.

    All DCs should be running a minimum of Windows Server 2012 R2, preferably 2016/2019
    24 AD Forest Functional Level / Domain Functional Level Older than Domain Controller Operating System

     

    • Ensure all Domain Controllers are updated to Windows Server 2012 R2 (or newer) and set DFL/FFL to 2012 R2 (or newer).
    • Change the domain level only after understanding all the implications!

The post Performing Active Directory Security Review appeared first on ADSploit.

]]>
The dangers of vendor shortcuts! https://adsploit.com/the-dangers-of-vendor-shortcuts/ Thu, 23 Dec 2021 06:49:35 +0000 https://cionsystems.com/?p=5377 Installers are hard to write. They generate a lot of customer support calls and seem to always need tweaking to support unforeseen or new customer environments. But installers fulfill several, important functions. Obviously, software needs to get installed and configured. In addition, the installation process usually established the security context for many products. However, both […]

The post The dangers of vendor shortcuts! appeared first on ADSploit.

]]>
Installers are hard to write. They generate a lot of customer support calls and seem to always need tweaking to support unforeseen or new customer environments. But installers fulfill several, important functions.
Obviously, software needs to get installed and configured. In addition, the installation process usually established the security context for many products. However, both vendors and customers encounter both a learning curve, and common pitfalls in many cases.

When security and core infrastructure is involved, this is a dangerous space to take shortcuts. For example, consider a Windows centric environment. Most companies recognize the install base and huge potential customer base. But some companies lack the domain expertise. Not knowing the Microsoft ecosystem, and basically in the “fake it before you make it” phase, they may simply wrap a Linux tool with a UI. All’s good, right? Looks like a Windows app, but no need to invest in the cross training and support a new development platform. (An example of this is Manage Engine’s AD Tools).
For example, one might build an Active Directory management tool using Linux as the deployment platform. Simply run the application in a Linux VM supporting Windows workloads. But, while the products look like a Windows solution, from a security standpoint, it is a Linux solution, with Linux vulnerabilities, hiding this from management tools.
For most almost all enterprises, Active Directory holds the keys to the kingdom. As such, It will be highly telemetered and monitored. But, if these tools are not secure, neither is the Active Directory instance.

Recently, an exploit leveraging Log4J – an integral component to Apache – appeared as a zero day. This m Meanings if any product utilizing Log4J on your network has elevated permissions then – your core infrastructure, identities, credentials and defenses are potentially compromised.

If the product in question is a management tool, holds elevated credentials, or can control configuration and monitoring – immediate action is required. This requires going to the AD logs and log aggregators to perform the a thorough forensic investigation. Examine network logs and event logs. DO NOT USE ANY SUCH PRODUCT TO PERFORM THESE TASKS. Having a product that provides real time alerts of all changes to the Active Directory is essential for security, for instance CionSystems Active Directory Change alerter/notifier that has the ability trap ‘all’ changes and send real time alerts.
Once an intruder can access Active Directory at this level, the impact is potentially catastrophic. Via Accounts in Active Directory, and the products service accounts, the threat actor will likely have access to credentials used by network tools, intrusion detection, log aggregators, and other core infrastructure. They will also be able to cover their trail and inject hacking tools, such as MimiKatz, into the environment. A recent example of CVE-2021-44228 which pertains to vulnerabilities in Apache Log4j. This is something any customer using a vendor supplied VM should investigate, thoroughly.
Lastly, do not assume applying a vendor fix is all that is required. These attacks are usually tools used to potentiate APT’s (Advanced Persistent Threats). This means a fix needs to be combined with ongoing forensics, removal of problematic products, and retrospective log analysis.

Note: Since the initial writing of this paper in early December, the scope and impact of CVE-2021-44228 has become apparent. Threat actors are using this vulnerability to potentiate attacks, and it is proving surprisingly damaging. In particular, ZD has noted:

“The FBI’s cyber division has issued an alert warning enterprises using Zoho-owned ManageEngine’s Desktop Central that advanced attackers have been exploiting a flaw to install malware since late October.”
From: https://www.ic3.gov/Media/News/2021/211220.pdf

The post The dangers of vendor shortcuts! appeared first on ADSploit.

]]>
FBI director says cybersecurity threat is increasing “almost exponentially” https://adsploit.com/fbi-director-says-cybersecurity-threat-is-increasing-almost-exponentially-2/ Wed, 15 Dec 2021 08:21:42 +0000 https://cionsystems.com/?p=5279 Are you ready? Are you prepared? https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html Anne Neuberger, a top cyber security official at the National Security Council, warned, “All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location. We urge you to take ransomware crime seriously and ensure your corporate cyber defense match the […]

The post FBI director says cybersecurity threat is increasing “almost exponentially” appeared first on ADSploit.

]]>
Are you ready? Are you prepared?

https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html

Anne Neuberger, a top cyber security official at the National Security Council, warned, “All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location. We urge you to take ransomware crime seriously and ensure your corporate cyber defense match the threat.”

Active Directory is the “critical” component of any enterprise security. Checkout our solutions!

The post FBI director says cybersecurity threat is increasing “almost exponentially” appeared first on ADSploit.

]]>
FBI director says cybersecurity threat is increasing “almost exponentially” https://adsploit.com/fbi-director-says-cybersecurity-threat-is-increasing-almost-exponentially/ Tue, 14 Dec 2021 12:55:42 +0000 https://cionsystems.com/?p=5259 Are you ready? Are you prepared? Following are the recent cyberattacks that are targeted against education industry: https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html https://abcnews.go.com/Politics/fbi-warns-cyberattacks-distance-learning/story?id=75038470 https://www.govtech.com/policy/2020-marks-a-record-breaking-year-for-cyber-attacks-against-schools.html https://abcnews.go.com/Technology/wireStory/university-california-victim-nationwide-hack-attack-76847800 Active Directory is the “critical” component of any enterprise security. Checkout our solutions!

The post FBI director says cybersecurity threat is increasing “almost exponentially” appeared first on ADSploit.

]]>
Are you ready? Are you prepared?

Following are the recent cyberattacks that are targeted against education industry:

https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html

https://abcnews.go.com/Politics/fbi-warns-cyberattacks-distance-learning/story?id=75038470

https://www.govtech.com/policy/2020-marks-a-record-breaking-year-for-cyber-attacks-against-schools.html

https://abcnews.go.com/Technology/wireStory/university-california-victim-nationwide-hack-attack-76847800

Active Directory is the “critical” component of any enterprise security. Checkout our solutions!

The post FBI director says cybersecurity threat is increasing “almost exponentially” appeared first on ADSploit.

]]>
Viewing Truncated PowerShell Output! https://adsploit.com/viewing-truncated-powershell-output/ Tue, 30 Mar 2021 16:57:17 +0000 https://cionsystems.com/?p=2922 Sometimes PowerShell truncates output, and if you don’t realize what’s going on, you’ll never get it to show. Where you’re expecting potentially lots more text, PowerShell replaces it with a single lousy ellipsis, cruelly taunting you. Column Width: If it’s just a column width problem, the fix is simple enough: just pipe to out-string and […]

The post Viewing Truncated PowerShell Output! appeared first on ADSploit.

]]>
Sometimes PowerShell truncates output, and if you don’t realize what’s going on, you’ll never get it to show. Where you’re expecting potentially lots more text, PowerShell replaces it with a single lousy ellipsis, cruelly taunting you.

Column Width: If it’s just a column width problem, the fix is simple enough: just pipe to out-string and add the width parameter.

BEFORE:

PS > Get-CsAnalogDevice | ft Identity,RegistrarPool

Identity Registrar Pool
——– ————-
CN=Public Telephone,OU=RTC Special Accounts,DC=vision,D… lync.vision.org
CN=Linksys ATA,OU=RTC Special Accounts,DC=vision,DC=org lync.vision.org
CN=HOTLINE,OU=RTC Special Accounts,DC=vision,DC=org lync.vision.org
CN=Paging Speaker, OU=RTC Special Accounts,DC=contoso,DC=… lync.vision.org

AFTER:
PS > Get-CsAnalogDevice | ft Identity,RegistrarPool | out-string -Width 160

Identity RegistrarPool
——– ————-
CN=Public Telephone,OU=RTC Special Accounts,DC=vision,DC=org lync.vision.org
CN=Linksys ATA,OU=RTC Special Accounts,DC=vision,DC=org lync.vision.org
CN=HOTLINE,OU=RTC Special Accounts,DC=vision,DC=org lync.vision.org
CN=Paging Speaker,OU=RTC Special Accounts,DC=vision,DC=org lync.vision.org

Collections / Arrays: It might be that the object you’re looking at is an array (a “collection”), and PowerShell is only showing the first few entries in that array, rather than the lot.

Here, the fix is to change the $FormatEnumerationLimit value. If you type it on its own into PowerShell the current value – probably 3 – will be returned. If you set a new value of -1, it’ll output ALL entries in your collection.

PS > $FormatEnumerationLimit
3
PS > $FormatEnumerationLimit=-1

BEFORE:

PS > Get-CsCertificate

Issuer : CN=vision-CA, DC=vision, DC=org
NotAfter : 6/07/2013 5:09:37 PM
NotBefore : 17/02/2012 7:04:52 PM
SerialNumber : 1234567890ABCDEF
Subject : CN=lync.vision.org, OU=IT, O=vision, L=Sydney, S=NSW, C=AU
AlternativeNames : {sip.contoso.net, lync2010.contoso.net, lync.vision.org…}
Thumbprint : 1234567890ABCDEF1234567890ABCDEF1234567890ABCDEF
Use : Default

AFTER:

PS > Get-CsCertificate

Issuer : CN=vision-CA, DC=vision, DC=org
NotAfter : 6/07/2013 5:09:37 PM
NotBefore : 17/02/2012 7:04:52 PM
SerialNumber : 1234567890ABCDEF
Subject : CN=lync.vision.org, OU=IT, O=vision, L=Sydney, S=NSW, C=AU
AlternativeNames : {sip.contoso.net, lync2010.contoso.net, lync.vision.org…}
Thumbprint : 1234567890ABCDEF1234567890ABCDEF1234567890ABCDEF
Use : Default

The post Viewing Truncated PowerShell Output! appeared first on ADSploit.

]]>
Setting Folder Permissions from command prompt! https://adsploit.com/setting-folder-permissions-from-command-prompt/ https://adsploit.com/setting-folder-permissions-from-command-prompt/#comments Wed, 09 Dec 2020 19:08:53 +0000 http://blog.cionsystems.com/?p=1289 CACLS: Change Access Control List C:\> cacls foldername /e /p Username:F (Full Permission) C:\> cacls foldername /D Username (to deny) C:\> cacls foldername /e /p username:F (full control) (e:edit) (p:permission) C:\> cacls “Foldername” /grant “Username”:F (full control) C:\> cacls C:\Shared /e /p  Everyone:F (to create a permission on shared folder) where /e is to preserve […]

The post Setting Folder Permissions from command prompt! appeared first on ADSploit.

]]>
CACLS: Change Access Control List

C:\> cacls foldername /e /p Username:F (Full Permission)

C:\> cacls foldername /D Username (to deny)

C:\> cacls foldername /e /p username:F (full control) (e:edit) (p:permission)

C:\> cacls “Foldername” /grant “Username”:F (full control)

C:\> cacls C:\Shared /e /p  Everyone:F (to create a permission on shared folder)

where /e is to preserve old permissions, /p is to add new permissions

F: stands for Full control

R: Read

W: Write

C: Change

If you don’t include /e the permissions assigned will be the only permissions on the file / directory.

To get the info of all files and folder inside the directory below is the PS command

PS C:\>Dir | Get-Acl (list all the permission on the shared folder)

To delete a share from command prompt –> net share Foldername /delete

The post Setting Folder Permissions from command prompt! appeared first on ADSploit.

]]>
https://adsploit.com/setting-folder-permissions-from-command-prompt/feed/ 4
SSL disappear from the certificate list of Windows Server https://adsploit.com/ssl-disappear-from-the-certificate-list-of-windows-server/ https://adsploit.com/ssl-disappear-from-the-certificate-list-of-windows-server/#comments Sat, 26 Sep 2020 17:56:41 +0000 http://blog.cionsystems.com/?p=1271 Users with Windows servers may occasionally encounter an issue when an imported certificate disappears from the list of server certificates. Most often, this happens right after completing certificate request in Internet Information Services (IIS) Manager . The lists of server certificates in IIS contains only certificates that are assigned to the corresponding private key and […]

The post SSL disappear from the certificate list of Windows Server appeared first on ADSploit.

]]>
Users with Windows servers may occasionally encounter an issue when an imported certificate disappears from the list of server certificates. Most often, this happens right after completing certificate request in Internet Information Services (IIS) Manager .

The lists of server certificates in IIS contains only certificates that are assigned to the corresponding private key and generated along with the certificate signing request (CSR) user for activating a particular certificate. When the link between certificate and private key is broken for some reason, the certificate disappears.

In order to make the certificate reappear, you will need to force the link between the certificate and the private key using the following steps.

1. Open the Microsoft Management Console (MMC) on your server machine. Make sure that you are logged as administrator before proceeding. To open MMC, press Win+R combination, type in mmc and click OK.

2. In File menu, select Add/Remove Snap-in.

3. In the Add or Remove Snap-ins dialogue window, select Certificates and click Add.

4.  Choose Computer Account in the Certificates snap-in window, click Next

5. Tick Local computer in the Select computer box, then click on Finish.

6. The required snap-in is selected now. Click the Ok button to proceed. The snap-in is added to console.

7.   Locate the certificate that was imported when completing certificate request. The certificate should be in Personal store. Note that icon of the certificate next to the domain name does not have a key on it. Means that no private key is assigned to the certificate.

8. Double –click the certificate and go to Details tab.

9. In certificate details locate the serial number field, click on it and copy its value.

10.  Open Command Prompt by pressing Win+R and typing the cmd, then click OK. Type the command as below and press enter.

11. In the command prompt type : certutil –repairstore my Serial_number xxxxxxxxxxxxxxx.( Note: Make sure the serial number of your certificate does not contain any spaces. It should be single string of symbols.)

If you receive “Certutil: -repairstore command FAILED:0X800900100” error, this means that the certificate request was generated on another server, and the private key is absent on this one. You need to either transfer the key to your server via PFX file or create a new CSR code and reissue the certificate.

 

The post SSL disappear from the certificate list of Windows Server appeared first on ADSploit.

]]>
https://adsploit.com/ssl-disappear-from-the-certificate-list-of-windows-server/feed/ 1
How to view OU linked GPO’s in Cionsystems GPO Manager. https://adsploit.com/how-to-view-ou-linked-gpos-in-cionsystems-gpo-manager/ https://adsploit.com/how-to-view-ou-linked-gpos-in-cionsystems-gpo-manager/#respond Sat, 05 Sep 2020 17:12:24 +0000 http://blog.cionsystems.com/?p=1262 To check which OU’s are linked to a Group Policy. 1. Login to Cionsystems GPO manager. 2. Go to Filters -> OU Linked GPO’s ->Click on OU Linked GPO’s. 3. When we click on OU Linked GPO’s it will display the list of GPO’s linked to OU’s. 4. Right click on any GPO and select link option. […]

The post How to view OU linked GPO’s in Cionsystems GPO Manager. appeared first on ADSploit.

]]>
To check which OU’s are linked to a Group Policy.

1. Login to Cionsystems GPO manager.

2. Go to Filters -> OU Linked GPO’s ->Click on OU Linked GPO’s.

3. When we click on OU Linked GPO’s it will display the list of GPO’s linked to OU’s.

4. Right click on any GPO and select link option.

5. It will display the list of OU’s linked to a GPO as below.

In this window we can link any new OU’s  by clicking on Add or remove existing  OU’s link.

 

 

 

The post How to view OU linked GPO’s in Cionsystems GPO Manager. appeared first on ADSploit.

]]>
https://adsploit.com/how-to-view-ou-linked-gpos-in-cionsystems-gpo-manager/feed/ 0
How to Restrict Group Policy for a User or Group in Cionsystems GPO Manager. https://adsploit.com/how-to-restrict-group-policy-for-a-user-or-group-in-cionsystems-gpo-manager/ https://adsploit.com/how-to-restrict-group-policy-for-a-user-or-group-in-cionsystems-gpo-manager/#respond Sat, 05 Sep 2020 16:43:50 +0000 http://blog.cionsystems.com/?p=1245 To restrict Group Policy for any user/group we need to follow the below steps. 1. Login to Cionsystems GPO Manager. 2. Select the group policy which has to be restricted and click on permissions tab. 3. From the GPO permissions  click on Add button and search for the user / group. 4.  Select the user […]

The post How to Restrict Group Policy for a User or Group in Cionsystems GPO Manager. appeared first on ADSploit.

]]>
To restrict Group Policy for any user/group we need to follow the below steps.

1. Login to Cionsystems GPO Manager.

2. Select the group policy which has to be restricted and click on permissions tab.

3. From the GPO permissions  click on Add button and search for the user / group.

4.  Select the user / group and hit on ok.

5. In set permissions tab select read and apply group policy options as deny and hit on apply.

6.  It will take some time to process.

7. Once permissions set successfully it will pop up the message as “successfully added” and hit on ok.

8. Now added user /group is skipped by applying this group policy settings.

9. Once the permission is added then type the command  gpupdate/force in the command prompt.

How to check which GPO has the settings.

1. Login to Cionsystems GPO.

2. Select any GPO and check the status of GPO.

3. In above GPO Computer Settings User Configuration Settings were disabled.

4. To verify the GPO settings click on view option by right clicking on GPO.

5. As  below report is displaying only Computer Settings hence it conclude that GPO is having Computer settings Enable and User Settings  Disable.

6. In the same way we can check other GPO’s status also.

 

 

 

The post How to Restrict Group Policy for a User or Group in Cionsystems GPO Manager. appeared first on ADSploit.

]]>
https://adsploit.com/how-to-restrict-group-policy-for-a-user-or-group-in-cionsystems-gpo-manager/feed/ 0
Account has been blocked contact tenant administrator error when configuring Azure AD/Office365 account in Cionsystems Enterprise Self Service or during AzureAD/Office365 login. https://adsploit.com/account-has-been-blocked-contact-tenant-administrator-error-when-configuring-azure-adoffice365-account-in-cionsystems-enterprise-self-service-or-during-azureadoffice365-login/ https://adsploit.com/account-has-been-blocked-contact-tenant-administrator-error-when-configuring-azure-adoffice365-account-in-cionsystems-enterprise-self-service-or-during-azureadoffice365-login/#respond Thu, 20 Aug 2020 17:34:44 +0000 http://blog.cionsystems.com/?p=1237 For the above error please follow the below steps to resolve the issue. Login to the Microsoft Azure Account portal with administrator access account. Url to login is   https://portal.azure.com After login –>  Click on view Manage Azure Active Directory as shown in the below image. Select properties. Click on Manage Security defaults. By default Enable […]

The post Account has been blocked contact tenant administrator error when configuring Azure AD/Office365 account in Cionsystems Enterprise Self Service or during AzureAD/Office365 login. appeared first on ADSploit.

]]>
For the above error please follow the below steps to resolve the issue.

Login to the Microsoft Azure Account portal with administrator access account.

Url to login is   https://portal.azure.com

After login –>  Click on view Manage Azure Active Directory as shown in the below image.

Select properties.

Click on Manage Security defaults.

By default Enable Security defaults it will set to yes change it to No. this will allow you to configure AzureAD / Office365 account successfully in Enterprise Self-Service.

The post Account has been blocked contact tenant administrator error when configuring Azure AD/Office365 account in Cionsystems Enterprise Self Service or during AzureAD/Office365 login. appeared first on ADSploit.

]]>
https://adsploit.com/account-has-been-blocked-contact-tenant-administrator-error-when-configuring-azure-adoffice365-account-in-cionsystems-enterprise-self-service-or-during-azureadoffice365-login/feed/ 0