George Simos

4.2K posts

George Simos banner
George Simos

George Simos

@GSimos

Former MVP System Center Configuration Manager, MCT, MCITP Ent Admin, MCSE / MCTS: Virtualization Solutions Training IT Pros since 2010.

Thessaloniki, Greece Entrou em Ekim 2009
798 Seguindo580 Seguidores
George Simos retweetou
Windows IT Pro
Windows IT Pro@MSWindowsITPro·
NTLM is being phased out in Windows 11. Learn the risks of legacy authentication, how to audit NTLM dependencies, and how Kerberos options like IAKerb and Local KDC prepare you for what’s next. #TechTakeoff x.com/i/broadcasts/1…
English
0
6
30
2.4K
George Simos retweetou
Ελληνικό Μουσείο Πληροφορικής
Υπολογιστές μας θα παίξουν στην ταινία The riders, που γυρίζετε αυτές τις ημέρες στην χώρα μας. Ο Μπραντ Πιττ θα μάθει ms-dos για να εκτυπώσει σε έναν εκτυπωτή dot matrix!
Ελληνικό Μουσείο Πληροφορικής tweet media
Ελληνικά
0
2
23
249
George Simos retweetou
Sean Metcalf
Sean Metcalf@PyroTek3·
In Active Directory, there is a method that’s been around for many years which changes the password last set date but not the actual password. This is what I call a “fake password change” since the account appears to have a recent password when scanning for old passwords based on password last set, but the underlying password hasn’t actually changed. I spoke about this in my 2015 @BSidesCharm talk which was my first conference talk. More details including step-by-step screenshots are here: adsecurity.org/?p=4969 Why does this happen? There are times where service account (or admin accounts) need to have password changes, but someone doesn’t want to do the work to change them. The ability to fake a password change requires modify rights on the pwdLastSet attribute which provides the ability to check/uncheck the setting “User must change password at next logon”. This setting is enabled when you want the user to change their own password when they logon. How does this work? This is simple to do when you have rights on the target account (in this example the password last changed in August 2025). We open up Active Directory Users and Computers (ADUC), double-click on the target account to open up the account properties and then click on the Account tab. From here we check the box for “User must change password at next logon” and click Apply. The PasswordLastSet date is now blank. Which makes it seem like the account has never had a password set. We continue with our process where we uncheck the box for “User must change password at next logon” we checked and then click Apply. After performing this action, the password change date has now been set to the current date and time even though the password itself hasn’t been changed since August 2025. We have successfully faked a password change! Why does this happen? This happens because the “User must change password at next logon” option is used to force a user to change their password at next logon. With it checked, Active Directory is waiting for the user to attempt to logon which is when the user is directed to change their password. During this time the PasswordLastSet value is blank since it is waiting for a new password. Once the user changes their password, the checkbox is effectively removed and the current date and time are set for the user’s passwordlastset property (technically this is the “pwdlastset” attribute, but the AD PowerShell cmdlets use that property). An attacker could use this technique for an account with an old password they discover and have control of the account (with the ability to flip this bit). This would show that the password changed without it actually changing. Detect fake Active Directory password changes at scale I wrote a PowerShell script that will scan either the Active Directory Admins or All Users in the domain to see if there’s a fake password change that has been performed on them. github.com/PyroTek3/Activ…
Sean Metcalf tweet mediaSean Metcalf tweet mediaSean Metcalf tweet media
English
6
156
981
97.5K
George Simos
George Simos@GSimos·
@jsnover Thank you for everything, not just PowerShell but the inspiring presentations and speaking engagements/keynotes. Enjoy retirement and keep us posted about things you will be tinkering with!
English
0
0
1
12
Jeffrey Snover
Jeffrey Snover@jsnover·
Retired. Thanks for all the fish!
GIF
English
116
26
851
34.8K
John Marcum
John Marcum@PJ_Marcum·
Somebody is definitely doing something incorrectly….. #MEMCM
John Marcum tweet media
English
16
1
29
84.4K
George Simos retweetou
Steven M. Salter
Steven M. Salter@StevenMSalter·
Windows 11 23H2 Home and Pro editions, have reached end of life / support today, upgrade to 24H2 to remain supported. If you're a Windows 11 23H2 Education/Enterprise edition customer, these editions will be supported for another 12 months until 11/10/2026. #Microsoft #Windows11
English
0
2
4
831
George Simos
George Simos@GSimos·
@jarwidmark @ramseyg Even for me, an old guy in tech, these mini courses are not only enjoyable, but also very insightful, thank you for that Johan!
English
0
0
2
29
George Simos retweetou
Johan Arwidmark
Johan Arwidmark@jarwidmark·
We all started somewhere, help someone else do the same. Share this free community course with a new tech who’s ready to jump into Microsoft IT (or that just started).
ViaMonstra@viamonstra

💥NEXT WEEK! #ViaMonstraMiniCourse NOV 20, 9–10:30AM CST 👨‍💻 @jarwidmark @AndrewJNet @richardhicks 💻Kick-start your IT journey! Microsoft tech fundamentals—no jargon, just clear demos + real “nobody told me this” tips #ActiveDirectory #Entra Sing up➡️ ow.ly/irml50Xq0Lg

English
1
4
9
1.3K
George Simos retweetou
Johan Arwidmark
Johan Arwidmark@jarwidmark·
Well, of course… That’s what October was missing :)
Paula Januszkiewicz@PaulaCqure

AI browsers getting hacked through screenshots? That's the new reality. @Brave Security just exposed how attackers hide invisible text in images to manipulate AI assistants, making them steal data, access banks, you name it. And it's not just one browser, it's everywhere. We've been in pentesting for 17 years and this is a whole new attack surface. The web's security rules just got rewritten by AI. Using AI browser tools at work? Let's talk about security assessment before something goes wrong. Read more on the case here: brave.com/blog/unseeable… #InfoSec #AIVulnerabilities #Cybersecurity #DataBreach

English
0
6
14
3.8K
Rudy Ooms
Rudy Ooms@Mister_MDM·
Ever feel like Intune takes its time to apply a policy? That behavior isn’t something new…. it goes back to the original “get, set, get” model Microsoft built nearly twenty years ago. The same OMA DM Protocol that once powered Windows Phone became the blueprint for every Intune policy still running today. Even now, you can still spot WindowsPhoneProvider references buried inside the OMA DM client code. This blog looks at where Intune all started: patchmypc.com/blog/the-histo… #Intune #MSIntune #Windows #Windows11
Rudy Ooms tweet media
English
1
26
103
15K
MattWreede
MattWreede@MattWreede·
@GSimos @juergkoller @Mister_MDM @PJ_Marcum 2019 was the golden time. Co-Management was the hotness. SKU-ification hadn't occurred yet. Strong leadership. Technical prowess. Then, the darkness. The SKU-ification. The sad times. But hey, we have AI slop now, so let's go ask CoPilot how to write a song as a pirate.
English
1
0
4
33
Bryan Dam
Bryan Dam@bdam555·
PSA: have heard multiple reports that this month's CUs (ex. KB5066835) break/alter the localhost loopback in ways that has broken a fairly wide swath of software. No official word yet that I'm aware of. Paging @bytenerd
English
8
12
38
7K