Nowadays many things are getting blocked by the government, and sometimes without even a valid reason. When something like this happen to you, you probably looking for some way to bypass these restrictions, and most of the times we look for free or cheap VPNs. In today’s world, nothing is actually free, there is always something we are giving in
Category: Cybersecurity
Zero-Day, APT, Exfiltration, Lateral-Movement, Privilege-Escalation, Botnet, Rootkit, Backdoor, Keylogger, Smishing, Vishing, Spear-Phishing, Social-Engineering, MITM, SQL-Injection, XSS, CSRF, Path-Traversal, Buffer-Overflow, Honeypot, CVE, CVSS, Red-Team, Blue-Team, Threat-Hunting, Malware-Analysis, MITRE-ATT&CK, Insider-Threat, Jailbreak, Shellcode, Exploit-Kit, LFI, RFI, Obfuscation, Payload, security advisory, vulnerability disclosure, CWE, OWASP, cybersecurity news, threat intelligence, SOC, SIEM, cryptotheft, evasion, CVE Security
Task Scheduler Error “A specified logon session does not exist” – Fix via Command Line and PowerShell for Scripting
This is very know issue, if you search internet, you will get multiple blog post with same solution for this issue, and if you follow the steps, it actually resolve this issue. In simple word, solution of this problem is Logon to the faulty system. Open SECPOL.MSC from Run Go to Security Settings | Local Policies | Security Options Open
Migrating a VMWARE VM to AWS using AWS PowerShell
In this topic we will describes the necessary steps to migrate a VMWare VM to the Amazon Web Services (AWS) using PowerShell. You could also migrate VM using AWS command line tools, but I found using PowerShell is much easier than command line tools. Requirements: AWS Tools for Windows PowerShell http://aws.amazon.com/powershell/ IAM account to authenticate. Basic knowledge on PowerShell. Preparing
Set File System Auditing via PowerShell
For last few days, I was trying to figure out how to set file system auditing via command line. I was looking for this as I had to apply some specific audit policy on multiple file servers. From GUI, we could do this, but it will take hours of manual activity. As requirement, I had to set Success Audit policy
How to stop extracting/viewing users details from AD
How to configure Home Folder with extra security
If you are having a domain controller, and decided to give a personal drive for all users, then home folder configuration is the best way to do it. But if you want to make it secure for every users, then you have to configure something extra with ntfs security and share security. Our current requirement as follows: Deploy home folder




