Skip to main content

Posts

Showing posts from March, 2017

Determine which Nodes have UAC Enabled with PowerShell

Wow!  It has been a while since I last blogged.  This has been a very busy year. Between my Navy activities and all the classes that I’m bringing online for clients, I am burning the candle at both ends. As many of you know, my last day of a PowerShell class is “Project Day”.  One of the projects that I helped out with this week involved determining if UAC was enabled.  Utilizing the template we created in class and a check of the registry, we were able to:          Remote to each client.          Determine if the client was online.          Report back the state of UAC. I decided to advance the code just a little to make sure everything reports back as an object.  Below is that code.  Wish I had more time to explain it step by step, but I have to keep moving.  I only have 3 weeks to get everything done for PowerShell Conference Europe. ForEach ( $N...

Demonstrating Hashing a File

I’m spending the week in San Diego delivering a Security+ class as part of my Annual Training for the United States Navy.  It has been a few years since my last Security+ class that I delivered to the US Air Force.  Since then, PowerShell has undergone a few version updates.  I decided to leverage one of the new cmdlets to help use demonstrate file hashing. The group that we are working with this week is sharp and asking some really great questions.  There is a little confusion out there on what a hash is so I’m adding this to both my military and civilian Security+ classes.  Enjoy! <# Demonstration of using a hashing algorithm to verify file integrity. ITC J. Yoder NR SPAWAR 119 Creation Date: March 7, 2017 Slide: Symmetric Algorithms Notes: This code is designed to be ran inside of the PowerShell ISE. Select the code in each step and press F8. Tested on PowerShell 5.  Execute the command below to determine you...