Posts

Showing posts from March, 2019

Suspicious Services in Windows - Tip #3

Image
Suspicious Services in Windows Many small/medium companies which don’t have policy, governance, control ..etc. in order to protect their data/services, surely these organizations will suffer from an unstable/insecure environment and in anytime might the whole environment become compromised. Might you have suspicious services are running in your environment but You don't know :).  There are enterprise solutions   might fulfill these requirements to scan such services but if you don't have it you can go ahead and try to play with WMI (Windows Management Instrumentation). Below script will provide all abnormal/suspicious services that are running in the remote desktops and not running in Windows or Program files folder or services are running by different accounts not built-in service logon accounts such localsystem nor networkservice..etc. You can amend on this script based on your  requirements . $Computer ...

Blue Screen in Windows - Tip #2

Image
Blue Screen in Windows Many of us might face blue screen issue in the operating system whether in desktop or server but no one interested to know what was the root cause of this blue screen due to we consider it as a bug in windows components or exception error in the operation system, we just reboot desktop/server then the OS will start working properly. The reason for having Blue screen actually is someone within windows Kernal trying to call windows Kernal "Kebugcheckex routine" and passing below 4 parameters in "Kebugcheckex routine" as following: VOID  KeBugCheckEx(   _In_ ULONG     BugCheckCode,   _In_ ULONG_PTR BugCheckParameter1,   _In_ ULONG_PTR BugCheckParameter2,   _In_ ULONG_PTR BugCheckParameter3,   _In_ ULONG_PTR BugCheckParameter4 ); https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/content/wdm/nf-wdm-kebugcheckex And as per Microsoft analysis of the root causes of crashes indicates the follo...