News

Easy PHP MySQL API for SysAdmins

Posted by SysAdmin-Tools on

Easy PHP MySQL API for SysAdmins

Welcome to SysAdmin-Tools!This blog explains how to create a simple PHP API in CPanel. This can also be completed locally, but takes a little more work. This API will allow you to post data to MySQL via a URL and read the data in MySQL by browsing to a URL. It also has an example of calling a specific row in the database based on an input. This is quite useful once you understand how it works and can customize the API to your needs. I really tried to make it as easy as possible so that almost anyone can understand that is...

Read more →

Useful NMAP commands for SysAdmins

Posted by SysAdmin-Tools on

Useful NMAP commands for SysAdmins

NMAP Is an extremely powerful tool for network scanning, surveillance and vulnerability management.The typical format of an NMAP command is as follows. nmap -function --script=scriptname <target>  The target can be a host (192.168.0.1) or a network (192.168.0.0/24)  Typical open port (services) scan nmap -sV <target>nmap -sV <network/subnet> (Example <192.168.0.0/24) LETS GET INTO IT! SSL NMAP Commands Enumerate the SSL ciphers enabled on a server/device to see if SSL2, SSL3 or TLS1.0 is still enabled nmap -sV --script ssl-enum-ciphers -p 443 <target> Detects whether a server is vulnerable to the OpenSSL Heartbleed bug nmap -p 443 --script ssl-heartbleed <target> Weak ephemeral Diffie-Hellman parameter...

Read more →

Easy GPO Loopback processing that works

Posted by SysAdmin-Tools on

Easy GPO Loopback processing that works

WHAT IS LOOPBACK PROCESSING?  Loopback processing allows you to apply user policies to computer objects. Like when you want to apply specific user policies to users only when they log into a terminal server, but not on their normal workstations.CREATE THE TWO GPO POLICIES 1. Create a Computer and User policy.The computer policy will be used to apply loopback processing to the device and the user policy will be used to host the settings for the selected users or groups. 2. Link both user and computer policies to the Computer OU that contains the target device. COMPUTER POLICY CHANGES3. NB: Unlink "Authenticated Users"...

Read more →

Saving passwords in your AD description fields?

Posted by SysAdmin-Tools on

Did you know that a simple "Domain User" can read all common Active Directory fields for every user? This includes the description field in a possible Domain Admin account. Use the View Active Directory Details application under free utilities to see what a normal Domain User can see from their account.  

Read more →

Useful commands for SysAdmins

Posted by SysAdmin-Tools on

Get the serial number or service tag of a device wmic bios get serialnumber Show the logged in user on a remote device. wmic /node:"workstation-name" computersystem get username Show the PID associated with a listening port or show the listening port number associated with a PID netstat -ano | find "portnumber"netstat -ano | find "pid" Find the session ID for a Remote Desktop User and log them off query user | find "username"logoff <ID of session> Quickly find .exe files in the C:\Users directory where RansomWare often hides. dir C:\Users /B /S /A | find ".exe" Disable sleep and shutdown reg ADD...

Read more →