-
YubiKey Passthrough on VMware Workstation and VMware Fusion
With the increasing support of MFA using security keys to authenticate in services like GitHub, M365, Google, AWS, Salesforce, and many others, coupled with the prevalent use of VMware desktop virtualization for development and testing, it is more and more of a need to get YubiKeys to passthrough to a Guest VM. This process does… Continue reading
-
Using XAML (WPF) To Build A PowerShell GUI
PowerShell speaks WPF and that means you can build a XAML-based GUI for your PowerShell script. It’s easy to do – here’s a small demo: Pretty straightforward. Step one is to tell PowerShell to load the PresentationFramework .NET Assembly. Step two is to build the XAML layout. Step three is to construct the XAML reader.… Continue reading
-
Run a Powershell command based on OU Membership
Admit it. Be honest now. We’ve all done it. We’ve run a command against a batch of users and forgot to limit the scope to the ones we were really targeting. I recently had to write a small Powershell-based application that loads all the users in a domain (filtered to exclude service accounts and admins)… Continue reading
-
Navigate AD with Powershell
Some environments have multiple domains in a single Active Directory forest. Working with Powershell in the same domain as your user account is easy, but what do you do when you need to run Powershell commands in one of the other domains? Change context. Powershell can traverse AD as a file system, and this allows… Continue reading
-
Who’s really running that Powershell instance?
I’ve been writing a lot of custom applications lately, many using Powershell and then packaged using Sapien’s Powershell Studio. Something that I’ve had to do a few times lately is provide applications to allow a non-privileged user to manipulate a user account in a different domain. There are a few pieces that go into this,… Continue reading
About Me
As a seasoned IT professional, I have developed an extremely well-rounded breadth and depth of knowledge and an exceptional ability to decipher and communicate complex issues. I have years of proven experience in IT leadership roles, security auditing, digital forensics, and overseeing development of custom applications, rounded out with a Bachelor of Science degree in Information Technology emphasizing Software Development. Over the course of my career, I have successfully held certifications as a GIAC Certified Incident Handler (GCIH), as well as CIW, CompTIA, and assorted Microsoft programming and networking certs. I have presented at the 2019 CETPA Conference in Anaheim and the 2021 CITE Conference in Sacramento.