Security Thoughts: Leveraging NTLM Hashes using Kerberos RC4-HMAC encryption (AKA Aorato’s Active Directory Vulnerability)

In a blogpost today, Tal Be'ery, Vice President Research at Aorato, an Israeli security company consisting of veterans of the Israeli Defense Forces specializing in Active Directory, published how weak encryption enables an attacker to change a victim’s password without being logged. Labeled as a vulnerability in Active Directory, this information sparked some controversy, so … Continue reading "Security Thoughts: Leveraging NTLM Hashes using Kerberos RC4-HMAC encryption (AKA Aorato’s Active Directory Vulnerability)"

I’ll be speaking at the Datacenter Group’s Partner Event

Working at a Systems Integrator (SI) has its perks. I get to discuss interesting technologies with interesting customers and interesting partners. Sometimes, my playing field feels like an ecosystem where manufacturers, partners and customers think and act like one. One of the partners we’re working closely these days and gives me that special feeling is … Continue reading "I’ll be speaking at the Datacenter Group’s Partner Event"

I’ll be speaking at Ngi-NGNs ‘Systems Management: Beyond Control’ event

I’ve been associated with the Dutch Networking User Group (NGN) for almost five years now. I’ve been speaking at their events and have helped others achieve the same goal. NGN has recently joined forces with the Dutch Platform for IT Professionals (Ngi), and an old tradition has been dusted off: We’re organizing a Windows Server-themed … Continue reading "I’ll be speaking at Ngi-NGNs ‘Systems Management: Beyond Control’ event"

KnowledgeBase: An update is available that improves management of weak certificate cryptographic algorithms in Windows

Last month, Microsoft has released KnowledgeBase article 2862966 An update is available that improves management of weak certificate cryptographic algorithms in Windows as a helping hand to administrators to indicate and/or eradicate the use of weak cryptographic algorithms in their networking environments.

Windows Gadgets and Windows Sidebar to Go

The Microsoft marketing department has decided to label a few of the incredible Windows features in Windows 7 and Windows 8 as ‘To Go’. Prime examples, of course, are ‘BitLocker-To-Go’ (encryption of removable drives) and ‘Windows-To-Go’ (running Windows from a removable drive). This week, I’m labeling the Windows Sidebar (Windows Vista) and Windows Desktop Gadgets … Continue reading "Windows Gadgets and Windows Sidebar to Go"

My interview with Paula Januszkiewicz (TechDays 2012)

I’m a Directory Services MVP. Have been for the last three years, too. This expertise is part of the Identity and Access area together with the ForeFront, ForeFront Identity Manager (FIM) and Enterprise Security MVPs. These latter guys and girl are really great. One of my favorite Enterprise Security MVPs is Paula Januszkiewicz. I’ve had … Continue reading "My interview with Paula Januszkiewicz (TechDays 2012)"