I hereby claim:
- I am joegasper on github.
- I am joegasper (https://keybase.io/joegasper) on keybase.
- I have a public key ASDCmG_QehgIwQJf6B46RTYvKYONihcYoWYJFBjgf5AZdwo
To claim this, I am signing this object:
#Inspired by http://woshub.com/rdp-session-shadow-to-windows-10-user/ | |
#You could feed ConvertFrom-String a template to have a perfect object from the qwinsta.exe command, but I didn't want to | |
#have to keep the template file around. | |
#This is quicker than walking someone through Quick Assist, but QA will work over the internet. | |
#This command will shadow a user's Windows 10 system and you will have control (after remote user's consent if you are proper - see GPO in the link). | |
$PC=(Read-Host -Prompt "PC Name");$ID = (qwinsta.exe /server:$PC | ConvertFrom-String | Where-Object P2 -eq console | select P4).P4;mstsc.exe /shadow:$ID /v:$PC /control |
<# | |
.Synopsis | |
Return a name based on Lorem Ipsum. | |
.DESCRIPTION | |
Calls public Loren Ipsum API and returns name and account name if requested. | |
.EXAMPLE | |
Get-LoremName | |
FirstName LastName | |
--------- -------- | |
Plane Gloriosam |
#See: https://1.1.1.1/ and https://www.cnet.com/news/cloudfare-new-1111-dns-privacy-tool-would-speed-your-internet-too/ | |
#Run in elevated PowerShell command shell | |
#Store current DNS servers | |
Get-NetAdapter -Physical | Where-Object {$_.Status -eq 'Up'} | Get-DnsClientServerAddress | Select ServerAddresses -expand ServerAddresses | Set-Content -Path $env:USERPROFILE\OriginalDNSservers.txt | |
$Display current DNS servers | |
Get-NetAdapter -Physical | Where-Object {$_.Status -eq 'Up'} | Get-DnsClientServerAddress | |
#Specifiy CloudFlare 1.1.1.1 service IP addresses (IPv4/IPv6) | |
$DNSservers = ('1.1.1.1','1.0.0.1','2606:4700:4700::1111','2606:4700:4700::1001') | |
#Set client DNS servers to CloudFlare DNS servers | |
Get-NetAdapter -Physical | Where-Object {$_.Status -eq 'Up'} | Set-DnsClientServerAddress -ServerAddresses $DNSservers |
$site = 'mysite01' | |
$source = "\\my-web1\e$\websites\$site\" | |
$destination = "E:\websites\$site\" | |
#List only first | |
$logfile = "E:\$site-robo-test.txt" | |
$switches = "/E /L /R:2 /W:3 /NP /FFT /DST /LOG:$logfile /XF "".DS_Store"" ""thumbs.db""" | |
& robocopy.exe $source $destination $switches.Split(' ') | |
#Check Log File | |
Get-Content -Path $logfile -First 17 |
# Inspiration from https://twitter.com/mrhvid/status/929717169130176512 @mrhvid @Lee_Holmes | |
function ResolveIp($IpAddress) { | |
try { | |
(Resolve-DnsName $IpAddress -QuickTimeout -ErrorAction SilentlyContinue).NameHost | |
} catch { | |
$null | |
} | |
} |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> | |
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> | |
<head> | |
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> | |
<title>ProofPoint URLdefense Decoder</title> | |
<style type="text/css"> | |
#decoded | |
{ | |
width:515px; | |
height:400px; |
#Updated ConvertFrom-DN to support container objects | |
function ConvertFrom-DN { | |
[cmdletbinding()] | |
param( | |
[Parameter(Mandatory, ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True)] | |
[ValidateNotNullOrEmpty()] | |
[string[]]$DistinguishedName | |
) | |
process { |
#Simple check on a generic WordPress site | |
$page = Invoke-WebRequest -Uri http://mywordpress03.site | |
$WPver = ($page.Scripts.src).where({$_ -match 'wp-embed.min'}).Split('=')[1] |
#Show all values in sequence up to number $seqnum | |
[int]$seqnum = 10 | |
$fibseq = @() | |
for($i = 0; $i -lt $seqnum; $i++) { | |
if ($i -eq 0 ) { | |
$fibseq = $fibseq + 0 | |
} | |
if ($i -eq 1 ) { | |
$fibseq = $fibseq + $i | |
} |
I hereby claim:
To claim this, I am signing this object: