You are here |
wise-forensics.com | ||
| | | |
pentestlab.blog
|
|
| | | | Group policy preferences allows domain admins to create and deploy across the domainlocal users and local administrators accounts. This feature was introduced in Windows 2008 Server however it can be abused by an attacker since the credentials of theseaccounts are stored encrypted and the public key is published by Microsoft.This leaves the door open to... | |
| | | |
blog.danskingdom.com
|
|
| | | | We use quite a few custom PowerShell scripts in some of our builds and releases. This led me to ask the question, which PowerShell log levels actually get written to the TFS Build and Release logs? So I did a quick test on both our on-premise TFS 2017 Update 2 installation and my personal VSTS account, and they yielded the same results. | |
| | | |
countuponsecurity.com
|
|
| | | | Following our last article about the Prefetch artifacts we will now move into the Windows Registry. When conducting incident response and digital forensics on Windows operating systems one of the sources of evidence that is normally part of every investigation is the Windows Registry. The Windows Registry is an important component of the OS and... | |
| | | |
danielsieger.com
|
|
| | A short guide on creating a Jekyll template using Bootstrap and Sass. |