BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. In short, it analyzes group membership, GPOs, permissions, and currently logged-on sessions to visually displays links between objects in order to identify misconfigurations and easy paths to compromise. This tool is not for analyzing the permissions on a single server, but rather for identifying the path of least resistance to gaining elevated Domain permissions.
In preparation for an upcoming post, I recently dove into my notes on installing the Prometheus monitoring server. My last time setting up Prometheus was on an Ubuntu server and the repository version was at least the same major revision version as the current release. This time I’m installing on Debian 9 and currently the latest Prometheus version is 2.3.2 while the Debian repository is offering 1.5.2. That’s unacceptable. While the sid repository does contain 2.3.2, I decided to take the opportunity to deploy in a cleaner (and less permanent) manner through Docker. Prometheus is well supported in Docker environments and it gave me an opportunity to brush up on my container deploying skills.
Azure File Sync became generally available to the public this month and I decided to implement it in my lab to gauge its strengths and weaknesses. The proposition of fully replicated, managed, and secured file synchronization across all branch offices of an organization makes for one of the strongest stand-alone use cases for the Cloud after Backup & DR, as long as it solves more problems than it introduces.
A presentation I created for a local Meetup as an introduction to Home Assistant, the open-source home automation platform.