4.9 • 696 Ratings
🗓️ 16 November 2021
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, November 16th, 2021 edition of the Sandstone at Storm Center's |
0:07.5 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Fort Walton Beach, Florida. |
0:14.5 | We got an emergency update from Microsoft, and this update does not actually fix security vulnerability. |
0:22.0 | Instead, it does fix a problem where you're no longer able to authenticate after applying |
0:27.8 | the Microsoft patches from November 9th. |
0:32.4 | This affects you if you're using a single sign-on inactive directory on-premise or via the Hyperasia Active Directory. |
0:42.9 | And if you're not using essentially the latest and greatest version of Windows server, |
0:46.8 | so Windows server 2019 and earlier are possibly affected by this bug. |
0:54.1 | If you're infected, you probably know it because users were not able to authenticate. |
0:58.9 | And yes, then please update your systems with this emergency patch. |
1:04.7 | Of course, you may have already backed out of the November 9th update. |
1:10.1 | So if you're brave, then apply that again and then try Microsoft's new update. |
1:17.5 | And talking about Active Directory, one issue that our handler Rob keeps running into is that |
1:25.6 | Microsoft won't allow you to paste a password into the password |
1:30.0 | change GUI. And that, of course, gets in the way of best practices these days. You aren't really |
1:36.2 | able to use any password safes and such for these passwords. So what Rob came up with is a little script that will allow you to copy paste the |
1:47.7 | password and the script will then change it for you within active directory. Rob posted two |
1:54.9 | versions of the script, fairly straightforward, fairly simple. The first one is, well, simpler, |
2:00.2 | but it does actually contain the old |
2:02.2 | new password as part of the script. So that, of course, puts it somewhat at risk of losing |
2:08.1 | that script or leaving it sitting on the server. The second script, a little bit more elegant. |
2:12.9 | It will actually prompt you for the old new password, but then allow you to paste the password into |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.