Recover FSMO Roles from a dead DC
avatar

As a system administrator you work hard to make sure it never happens by having as much redundancy as you can but sooner or later you will lose a domain controller which has a role assigned to it.  If you have true redundancy you will still have a backup domain controller.

The only problem is the roles will not just transfer over.  You will need to seize them from the dead controller and give the roles to the backup domain controller.

To seize the roles it is very easy, first login into a working domain controller and go to the command prompt with administration rights.  Then follow the steps below:

  1. type “ntdsutil” and press enter
  2. type “roles”
  3. Next type “connections” when you see “fsmo maintenance:” prompt
  4. Type “connect to server <working dc’s name>” at the “server connections:” prompt
  5. Enter “role” while at the “fsmo maintenance:” prompt
  6. Type “Seize <FSMO Role to be transferred>” you can also use “?” to get a list of commands including all the FSMO roles.
  7. Click Yes to the prompt which pops up outside of the command prompt

That’s it, your roles have been seized by the domain controller.

Posted in Guides, Windows | Tagged , , | Leave a comment

Add a User to a Linux Group
avatar

If you need to add an existing user to a Linux group it is very easy, just run the following command:

usermod -a -G <group name> <user name>

Posted in Guides, Linux | Tagged , | Leave a comment

RFID Thief v2.0
avatar

This is an interesting project that shows you how you can create a long range RFID reader.  This is another reason why wireless, no matter how short the range, is insecure.

 

Source: RFID Thief v2.0 – scund00r

Posted in Hacks | Leave a comment

Using iptables to route OpenVPN traffic
avatar

To have your vpn traffic be able to reach the internet you just need to add the following iptable rules:

iptables -A FORWARD -i tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o tun0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth0 -j MASQUERADE

This would take the tunnel adapter of tun0 and route the traffic through eth0 for the vpn subnet of 192.168.0.0.

Posted in Arch, CentOS, Fedora, Guides, Linux, Networking | Tagged , | Leave a comment

NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
avatar

Source: NTFS permissions for Redirected Folders (or Home Directories) | Off Campus

Posted in Guides | Leave a comment