Friday, April 29, 2005

Configuring Firewall in SP2
Harsh Shah has an article on this, including registry entries and using netsh

SC
SC is a command line program used for communicating with the NT Service Controller and services.

Commands:
query-----------Queries the status for a service, or enumerates the status for types of services.
queryex-----------Queries the extended status for a service, or enumerates the status for types of services.
start-----------Starts a service.
pause-----------Sends a PAUSE control request to a service.
interrogate-----Sends an INTERROGATE control request to a service.
continue--------Sends a CONTINUE control request to a service.
stop------------Sends a STOP request to a service.
config----------Changes the configuration of a service (persistant).
description-----Changes the description of a service.
failure---------Changes the actions taken by a service upon failure.
qc--------------Queries the configuration information for a service.
qdescription----Queries the description for a service.
qfailure--------Queries the actions taken by a service upon failure.
delete----------Deletes a service (from the registry).
create----------Creates a service. (adds it to the registry).
control---------Sends a control to a service.
sdshow----------Displays a service's security descriptor.
sdset-----------Sets a service's security descriptor.
GetDisplayName--Gets the DisplayName for a service.
GetKeyName------Gets the ServiceKeyName for a service.
EnumDepend------Enumerates Service Dependencies.

Wednesday, April 27, 2005

IIS Lockdown
Good walkthru of IIS Lockdown. Not needed in IIS 6 of course!

Scripting Ideas
[1] Backup Script
Been looking at Mike Horowitz''s Backup Script but getting errors...

[2] Inventory
Doctor Scripto's Script Shop Inventorying Windows XP Service Packs - Part 2 is very useful.

The script uses ADO to query AD and outputs which PCs are running XP and what SP they're on. The plan is to modify it just enough so that non-XP machines are handled (currently "not running XP" is what is displayed).

Snapper
"Snapper scans a disk or folder, creating a "snapshot" of the dates, times, sizes and other properties of the files it finds. This snapshot can be saved, and used to produce reports of changes* that are subsequently made to those files. Snapshots don't have to be created from the same source...". Snapper is here.

Introduction to Spyware Keyloggers
A general introduction and tools to use. Article is here.

Web Browser Forensics
Security Monkey has a good article on web browser forensics.

Update: Part II is now available.

Tuesday, April 26, 2005

Cool Tools
Scroll down the page for a listing of useful tools including Blat and Joeware:
SearchWinSystems listing of free downloads


Also Bill Boswell's "Nothing Up my Sleeves" listing of free / useful tools.

...all part of the "kit".