top of page

Greetings, brave wanderer of the web! You've stumbled upon a site dedicated to fortifying Windows systems against would-be hackers, simplifying the black hole of deployment processes, and unleashing the wizardry of PowerShell. Basically, it’s like a security boot camp—minus the yelling, burpees, and need for camo, unless you like that sort of thing.

​

Here, we’ll dive into the shadowy world of hacking techniques, dissecting various attack methods while pitting them against Windows' security measures. Think of it as a live-action chess match: hackers exploit vulnerabilities caused by misconfigurations, and we swoop in to outmaneuver them. (Spoiler alert: this is NOT an invitation to go all Black Hat with what you learn here. Let’s keep it ethical, people.)

​

My first tango with Windows security was back in 2000 on an NT4 Server. “Locking it down” mostly meant playing whack-a-mole with file permissions. Since then, I’ve hardened everything Microsoft. And when GPOs and domains aren’t in the picture, securing Windows becomes less about the manuals and more about artistry—the kind where you automate security without turning your system into a shiny, unusable brick. That’s the puzzle that gets me out of bed in the morning.

​

For the automation enthusiasts, fear not! There will be plenty of ConfigMgr, MDT, and PowerShell love to go around. Why bother pointing and clicking your way to carpal tunnel when you can script your way to a streamlined utopia? Welcome aboard—just don’t forget your sense of humour. It’s as essential here as a solid backup plan.

​

​Links to Content

Scripts can be found on Github @ https://github.com/Tenaka.​

Pentesting stuff can be found @ https://tenaka.gitbook.io/pentesting (this is under development).

​

Attacker vs Defender Results

Reference and results table for the tests carried out so far, click on the links for details.

​

Contact me by submitting a message

Thanks for submitting!

Feel free to use the scripts and techniques but only after thoroughly testing and not for anything malicious. All the content on this site has been tested and should work as-is, the steps are I hope clear and concise, however, if there are any problems please email me using the form.
​
The material and information contained on this website are for general information purposes only. You should not rely upon the information on this website as a basis for making any changes to your Enterprise IT systems.

bottom of page