Realistic Wedding Vows I will abide your ego if you will abide mine— If you ignore my awkward habits, I can exist with thine. I’ll overlook socks on the floor or an abandoned shoe if you promise not to mention an extra line or two you might detect in years to come, scribed onto the […]| lifelessons – a blog by Judy Dykstra-Brown
In previous blogposts, I’ve described how we can use the OpenSSH extension through Azure Arc to gain better remote SSH and RDP sessions to machines without requiring direct network access. However, they’ve always required we login to the machine with local credentials (or domain, but that’s old school, we want to get away from that). […] The post Modern Server Management – Azure Arc RDP with Entra ID Authentication appeared first on Mindcore Techblog.| Mindcore Techblog
bees humfrom toadflaxto foxgloveslowly the garden she tendsgrows wild at the edges © Xenia Tran Laurels #4 We are deeply honoured and delighted that the above tanka was published in Laurels #4 in August 2025. Warm-hearted thanks to Jackie Chou for selecting my poem and to the team at Laurels for putting this beautiful edition … Continue reading "Tanka: Bees Hum"| Tranature
As a black woman raised in the South in Tennessee, I thought that I was an ordinary person, nothing special about me. I was told that I would probably live my whole life in the South, never going beyond the boundary of my hometown. I was also someone who loved books and how you could... Continue Reading →| Help from Heaven
AhnLab SEcurity intelligence Center (ASEC) recently identified cases of Makop ransomware attacks targeting South Korean users. The Makop ransomware has been distributed to South Korean users by disguising as resumes or emails related to copyrights for several years. Recently, it has been reported that the ransomware is exploiting RDP for attacks. 1. Installing Malware […]| ASEC
Introduction As organizations increasingly rely on distributed computing environments, secure and efficient server management has become a cornerstone of IT operations. Traditional access methods—often involving VPNs or static credentials—fail to provide sufficient protection against modern threats. The concept of ZTNA for Server Management (Zero Trust Network Access) offers a transformational approach to securing administrative access. By enforcing identity verification, device trust, an...| hyper-ict.com
In this first Azure Arc Remote Management focused blogpost, let’s cover the OpenSSH extension and how it can be used to get a remote PowerShell connection over SSH and even a Remote Desktop Session, all without any direct network connectivity. The best part: It costs absolutely nothing! Join me in this adventure to more securely […] The post Modern Server Management with Azure Arc – Remote Management Pt.1 (SSH/RDP) appeared first on Mindcore Techblog.| Mindcore Techblog
Key Takeaways Initial access was via a password spray attack against an exposed RDP server, targeting numerous accounts over a four-hour period. Mimikatz and Nirsoft were used to harvest credential…| The DFIR Report
RDP yang berlangsung di salah satu ruang rapat DPR Papua itu, membahas kasus pelemparan bom molotov ke Kantor Redaksi Jubi di Jalan SPG Teruna Waena, Kota| Jubi Papua
Image Credit by Karsten Winegeart @ Unsplash Let go of your inhibitions, And start climbing mountains to find joy. The lives we live are not fiction, And we only have a few years to enjoy. Let go o…| Help from Heaven
“My daughter Luna is ten. Our dog ran away, she refused to stop looking for him and now she’s vanished too.”| Masons Menagerie
Problem:| Steronius' Programmatically Tolerable Repository of Technical Goodies
Microsofts Hyper-V unterstützt das Durchreichen von USB-Geräten wie WebCams mittels RemoteFX USB-Geräteumleitung. Jedoch sind die hierfür benötigten Konfigurations-Optionen und Policies sehr gut versteckt und müssen erst aktiviert werden.| Gunnar Haslinger
In the context of a Red Team assessment, in this post I’ll look at some options for using SOCKS to gain external access to an internal network. I’ll cover the obvious methods and why I’m overlooking them, a crude method using standard tools (this post) and a more refined approach using modified tools (in part 2). […] The post Reverse port forwarding SOCKS proxy via HTTP proxy (part 1) appeared first on Portcullis Labs.| Portcullis Labs
Recap In part 1 of this blog series we presented the “Reverse RDP” attack vector and the security hardening patch we designed and helped integrate into FreeRDP. The patch itself was tar…| Eyal Itkin
Introduction The story behind this 2-part blog series started quite a while ago, on September 2018, when I started a vulnerability research on a (then) novel attack vector: “Reverse RDP”…| Eyal Itkin
Are you also having the issue where accessing your Hyper-V VM Guests works great when connecting via Virtual Machine Connection, but the VM hangs when you try to access it using Enhanced Session or…| Microsoft Security Solutions