Secure Boot certificates are expiring

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฏ๐—ผ๐—ผ๐˜๐˜€ ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ๐˜€ ๐—ฎ๐—ฟ๐—ฒ ๐—ฒ๐˜…๐—ฝ๐—ถ๐—ฟ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐—๐˜‚๐—ป๐—ฒ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒย – ๐—บ๐—ฎ๐—ป๐˜‚๐—ฎ๐—น ๐˜€๐˜๐—ฒ๐—ฝ๐˜€ ๐—ฎ๐—ฟ๐—ฒ ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ๐—ฑ ๐˜ฑ๐˜ต. 1 Microsoft says many Windows client devices may update automatically, butย Windows Server requires manual action. I assumed this type of operation would be ๐˜€๐˜๐—ฟ๐—ฎ๐—ถ๐—ด๐—ต๐˜๐—ณ๐—ผ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ฑ. โŒ It wasnโ€™t. ๐——๐—ถ๐˜€๐—ฐ๐—น๐—ฎ๐—ถ๐—บ๐—ฒ๐—ฟ: This is just a record of how I proceeded step […]

Do you use RDP?

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐˜‚๐˜€๐—ฒ ๐—ฅ๐——๐—ฃ? Thereโ€™s a ๐˜€๐˜‚๐—ฟ๐—ฝ๐—ฟ๐—ถ๐˜€๐—ถ๐—ป๐—ด ๐—ฟ๐—ถ๐˜€๐—ธ you might not be thinking about โ€” and itโ€™s already on your machine. When you use Remote Desktop (๐—ฅ๐——๐—ฃ) via the ๐— ๐—ฆ๐—ง๐—ฆ๐—– client, any credentials you enter can be retrieved in plaintext in the process ๐—บ๐—ฒ๐—บ๐—ผ๐—ฟ๐˜†. That means your domain admin password could […]

Disable NetBIOS, LLMNR, LMHOSTS and WINS

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ก๐—ฒ๐˜๐—•๐—œ๐—ข๐—ฆ, ๐—Ÿ๐—Ÿ๐— ๐—ก๐—ฅ & ๐—Ÿ๐— ๐—›๐—ข๐—ฆ๐—ง๐—ฆ (๐—ฎ๐—ป๐—ฑ ๐—ช๐—œ๐—ก๐—ฆ)? You shouldโ€”this is basic Windows hardening for domain devices. ๐—ช๐—ต๐—ฎ๐˜ ๐˜๐—ผ ๐˜๐˜‚๐—ฟ๐—ป ๐—ผ๐—ณ๐—ณ (๐—ฎ๐—ป๐—ฑ ๐—ต๐—ผ๐˜„): ๐Ÿ”น ๐—ก๐—ฒ๐˜๐—•๐—œ๐—ข๐—ฆย โ€“ legacy naming/session protocol. GPOs are hit-or-miss; set the registry per adapter (use a startup script to loop all adapters): ๐˜๐˜’๐˜“๐˜”\๐˜š๐˜ ๐˜š๐˜›๐˜Œ๐˜”\๐˜Š๐˜ถ๐˜ณ๐˜ณ๐˜ฆ๐˜ฏ๐˜ต๐˜Š๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ฐ๐˜ญ๐˜š๐˜ฆ๐˜ต\๐˜š๐˜ฆ๐˜ณ๐˜ท๐˜ช๐˜ค๐˜ฆ๐˜ด\๐˜•๐˜ฆ๐˜ต๐˜‰๐˜›\๐˜—๐˜ข๐˜ณ๐˜ข๐˜ฎ๐˜ฆ๐˜ต๐˜ฆ๐˜ณ๐˜ด\๐˜๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ง๐˜ข๐˜ค๐˜ฆ๐˜ด\{๐˜Ž๐˜œ๐˜๐˜‹}\๐˜•๐˜ฆ๐˜ต๐˜ฃ๐˜ช๐˜ฐ๐˜ด๐˜–๐˜ฑ๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด=2 ๐Ÿ”น ๐—ช๐—œ๐—ก๐—ฆย โ€“ only matters if […]

Windows Server Core

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—›๐—ฎ๐˜๐—ฒ ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐—–๐—ผ๐—ฟ๐—ฒ? ๐—›๐—ฒ๐—ฟ๐—ฒ’๐˜€ ๐—ช๐—ต๐˜† ๐—ฌ๐—ผ๐˜‚ ๐—ฆ๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐—”๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—จ๐˜€๐—ฒ ๐—œ๐˜ Windows Server Core is one of the ๐—บ๐—ผ๐˜€๐˜ ๐—บ๐—ถ๐˜€๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ผ๐—ผ๐—ฑ ๐—ฎ๐—ป๐—ฑ ๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜‚๐˜€๐—ฒ๐—ฑ “tools” in the Windows ecosystem. ๐Ÿ–ฅ๏ธ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ถ๐˜? Itโ€™s Windows Server โ€” but ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—š๐—จ๐—œ. Just PowerShell, Command Line, and sconfig. And yes, it still supports critical […]

UAC – Prompt for consent for non-Windows binaries

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—ง๐—ฟ๐˜† ๐˜๐—ต๐—ถ๐˜€ ๐—ผ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—บ๐—ฎ๐—ฐ๐—ต๐—ถ๐—ป๐—ฒ: Windows + R โ†’ msconfig.exe โ†’ ENTER If msconfig opens without a prompt, your UAC config is too weak. This is a common misstepโ€”many environments still run default Windows settings, leaving a gap attackers love to exploit via UAC bypass techniques. โœ… ๐—›๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐—ต๐—ผ๐˜„ ๐˜๐—ผ ๐—ณ๐—ถ๐˜… […]

UAC Recommended Settings

๐Ÿ”’ Secure Bits ๐Ÿ’ก This is how your UAC configuration should look. Does it look different? If so, there should be a reason for it, as you might be allowing a potential attacker to bypass your UAC. There are usually over 300 items in security baselines, many of them crucial from a cybersecurity perspective. If […]

RDP Security Features

๐Ÿ”’ย Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐˜‚๐˜€๐—ฒ ๐—ฅ๐——๐—ฃ ๐—ฟ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜† ๐—ถ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜? Then you should know there are more secure ways to do it. ๐—•๐˜† ๐—ฑ๐—ฒ๐—ณ๐—ฎ๐˜‚๐—น๐˜, your credentials are sent to the remote host during an RDP session โ€” which means if the machine is compromised, attackers can steal and reuse them. ๐—•๐˜‚๐˜ ๐˜๐—ต๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐—ด๐—ผ๐—ผ๐—ฑ ๐—ป๐—ฒ๐˜„๐˜€ […]

RDP Restricted Admin Mode

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐—ฌ๐—ผ๐˜‚ ๐—จ๐˜€๐—ฒ ๐—ฅ๐—ฒ๐˜€๐˜๐—ฟ๐—ถ๐—ฐ๐˜๐—ฒ๐—ฑ ๐—”๐—ฑ๐—บ๐—ถ๐—ป ๐— ๐—ผ๐—ฑ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ฅ๐——๐—ฃ? If not, you shouldโ€”it ๐—ฝ๐—ฟ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜๐˜€ ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐—ฒ๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ. ๐—ช๐—ต๐˜† ๐—œ๐˜ ๐—˜๐˜…๐—ถ๐˜€๐˜๐˜€: Restricted Admin Mode was designed to let administrators connect to a potentially compromised device without passing their credentials to it. You must already be an administrator on the target machine, but your credentials […]

RDP – MSTSC Plaintext Password

๐Ÿ”’ย Secure Bits ๐Ÿ’ก ๐—ง๐—ต๐—ถ๐—ป๐—ธ ๐—ฅ๐——๐—ฃ + ๐—–๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ ๐—ธ๐—ฒ๐—ฒ๐—ฝ๐˜€ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฑ๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—ฎ๐—ฑ๐—บ๐—ถ๐—ป ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐˜€ ๐˜€๐—ฎ๐—ณ๐—ฒ? ๐—ก๐—ผ๐˜ ๐—ฟ๐—ฒ๐—ฎ๐—น๐—น๐˜†. Even in 2025,ย many ๐—ฎ๐—ฑ๐—บ๐—ถ๐—ป๐˜€ ๐˜€๐˜๐—ถ๐—น๐—น ๐—ฒ๐˜…๐—ฝ๐—ผ๐˜€๐—ฒ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—”๐—ฑ๐—บ๐—ถ๐—ป ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ย without realizing it โ€” just by using RDP to access Domain Controllers from their regular workstation. ๐Ÿง ย โ€œBut Iโ€™ve got ๐—–๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ, Iโ€™m protected!โ€ Not always. ๐—›๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐˜„๐—ต๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—ต๐—ฎ๐—ฝ๐—ฝ๐—ฒ๐—ป๐˜€ย ๐—ถ๐—ป ๐—ฐ๐—ฎ๐˜€๐—ฒ […]

Privileged Access Workstations (PAWs)

๐Ÿ”’ Secure Bits ๐Ÿ’ก Why should you use Privileged Access Workstations (PAWs)? Accessing your infrastructure through a basic user device leaves your privileged account credentials in the deviceโ€™s memory, and it is making you susceptible to keyloggers (software or hardware) that can capture these credentials. To mitigate this risk, implement PAWs in your environment and […]