viernes, 10 de octubre de 2025

Hobby. Photo video

Sometimes I have to make a video with photos for a special family event. It takes a long time between making one video and the next, and I can't remember which tools I used. I'm writing this post to remind me.

It is not a proffesional solutions, but the result is very good if you have a few time or experience.

It's usually a video for someone special, and I have to search through all the photos where they appear, so I've been looking for tools to help me.

DIGIKAM (free use). This program searches for faces and classifies them; then it's very easy to search all the photos of a specific person.


Labeled one person and do a query



PhotoStage (Free version). If you want to make a simple video + audio with your photos, you can use this easy tool





by GoN | Published: Oct 2025 | Last Updated:

martes, 7 de octubre de 2025

WINDOWS. GPO. Security login screen message.

 Purpose

Warning message before LOGON and information from the latest LOGON to the system

Steps

Apply this GPO to the OU where the PCs are located

 Message before LOGON

Policies->Windows Settings->Security Settings->Local Policies/Security Options->Interactive Logon



*information from the latest LOGON to the system

Policies->Windows Settings->Security Settings->Local Policies/Security Options-> Administrative templates-> Windows Components/ Options start Windows Sesion

The final GPO



Show very important and professional safety information with this small configuration.
by FF & Gon  | Published: Oct 2025 | Last Updated:

viernes, 3 de octubre de 2025

WINDOWS. WIFI. WLAN Report

Purpose

Make a full Wifi configuration report

Steps

COMMAND:  netsh wlan show wlanreport


The result:




The report is more longer that this example.

by GoN | Published: Oct 2025 | Last Updated:

SECURITY. Windows Wifi passwords clear

Purpose

Show the Wifi password saved in your Windows computer.

Steps

Show Wifi's SID:

Command:  netsh wlan show profiles


Show Wifi password:

From the previous list we select SID

Command: netsh wlan show profile name="300GONMEC" key=clear


 GoN | Published: Oct 2024 | Last Updated:

jueves, 2 de octubre de 2025

SECURITY. Audit Tool. CLARA. ENS

 

Purpose

Compliance with the minimum standards established in the ENS (National Security Scheme) Spain.

Explanation :"Tool for assessing the technical security features defined by Royal Decree 3/2010, updated by Royal Decree 311/2022, which regulates the National Security Framework for e-Government. The compliance analysis is based on the standards provided by the security templates in the specific guides for the 500, 600, and 800 series."

There are Windows and linux versions

Link: https://www.ccn-cert.cni.es/es/soluciones-seguridad/clara?format=html

Steps

Download and execute the app


Parameterize




Executive Report


Technical Report





It is an important tool and a detailed report to know the status of your security level.
by GoN | Published: Oct 2025 | Last Updated:

miércoles, 17 de septiembre de 2025

Windows. PS. Como instalar masivamente-remotamente un programa en red.

Como instalar un programa remoto en PS.


Desde la descarga hasta su instalación y verificación.

En este caso vamos a poner un ejemplo de como instalar el cliente de Wazuh en una red de servidores con comandos de PS.

La idea es desde un servidor central (Servidor1) lanzar la instalación del programa en varios servidores remotos.

Solo necesitaremos lanzar el script desde un servidor abriendo una consola de Powershell

Necesitaremos antes algunos preparativos previos:

Preparativo 1: Preparamos el script que se ejecutará en los servidores locales

Preparativo 2: Preparamos el script que se lanzará la instalación a los servidores remotos

Preparativo 3: Prepararemos el listado de host a los que instalaremos el programa.

Paso 1: Ejecutamos el proceso


Preparativo 1: Preparamos el script que se ejecutará en los servidores locales


Se debe copiar en una ruta donde todos los hosts tengan acceso, en este ejemplo la dejaremos en:

\\Domain.local\SYSVOL\Domain.LOCAL\MovApp\SIEM\Wazuh_agent_4.12.ps1

FICHERO: SIEM\Wazuh_agent_4.12.ps1

# PowerShell Script

 

# --- Guard clause: salir si Wazuh ya está instalado ---

$svc = Get-Service -Name 'WazuhSvc' -ErrorAction SilentlyContinue

$agentDir = "${env:ProgramFiles(x86)}\ossec-agent"

 

if ($svc -or (Test-Path "$agentDir\client.keys")) {

    Write-Output "Wazuh Agent ya instalado. Saliendo."

    exit 0

}

# --- fin guard clause ---

 

# PowerShell Script

 

# Define el nombre del host

$hostname = [System.Net.Dns]::GetHostName()

 

# Descarga el instalador del agente Wazuh de la web del fabricante

Invoke-WebRequest -Uri https://packages.wazuh.com/4.x/windows/wazuh-agent-4.12.0-1.msi -OutFile $env:tmp\wazuh-agent;

 

# Instala el agente Wazuh con el nombre del host como el nombre del agente

msiexec.exe /i $env:tmp\wazuh-agent /q WAZUH_MANAGER='192.168.x.x' WAZUH_AGENT_GROUP='default' WAZUH_AGENT_NAME=$hostname

 

#Pausa de 10 segundos antes de iniciar el servicio

Start-Sleep -Seconds 10

 

Write-Host " Inicializamos el servicio1. Puede dar error "

NET START WazuhSvc

Write-Host " Inicializamos el servicio2 "

Start-Sleep -Seconds 10

Start-Service -Name "WazuhSvc"

Set-Service -Name "WazuhSvc" -StartupType Automatic

#Fin de Servicio instalado

 

#ejecución remota de executable

 

Start-Sleep -Seconds 5

Write-Host "Intento de conexión con el servidor Wazuh..."

 

$exePath = "C:\Program Files (x86)\ossec-agent\agent-auth.exe"

 

# Desbloquear el ejecutable si fue descargado

Unblock-File -Path $exePath

 

# Ejecutar el agente con argumentos

Start-Process -FilePath $exePath -ArgumentList "-m 10.115.79.215" -Wait -NoNewWindow

 

Write-Host "Verifica el servio instalado"

$svc = Get-Service -Name 'WazuhSvc' -ErrorAction SilentlyContinue

$agentDir = "${env:ProgramFiles(x86)}\ossec-agent"

 

if ($svc -or (Test-Path "$agentDir\client.keys")) {

    Write-Output "Verifica Wazuh Agent -> instalado OK. Saliendo."

  

}

# --- fin guard clause ---

 

 

Preparativo 2: Preparamos el script que se lanzará la instalación a los servidores remotos


Este es el único script que ejecutaremos.

FICHERO: InstallRemoto.ps1 

# Ruta al archivo de servidores

$servidores = Get-Content "servidores.txt"

 

# Ruta del script a copier, en una ruta donde accedan todos los hosts

$scriptPath = \\YYYYY.local\SYSVOL\XXXX.LOCAL\MovApp\SIEM\Wazuh_agent_4.12.ps1

 

foreach ($serverName in $servidores) {

    Write-Host " Iniciando despliegue en ${serverName}..." -ForegroundColor Cyan

 

    try {

        # Crear sesión remota con credenciales actuales

        $session = New-PSSession -ComputerName $serverName

 

        # Crear carpeta en remoto

        Invoke-Command -Session $session -ScriptBlock {

            $folder = "C:\tmp"

            if (-Not (Test-Path $folder)) {

                New-Item -Path $folder -ItemType Directory

            }

        }

 

        # Copiar el script al servidor remoto usando ruta UNC

        $remoteScriptPath = "\\${serverName}\C$\tmp\Wazuh_agent_4.12.ps1"

        Copy-Item -Path $scriptPath -Destination $remoteScriptPath

 

        # Ejecutar el script en remoto

        Invoke-Command -Session $session -ScriptBlock {

            & "C:\tmp\Wazuh_agent_4.12.ps1"

        }

 

        Write-Host " Despliegue completado en ${serverName}" -ForegroundColor Green

    }

    catch {

        Write-Host " Error en el despliegue en ${serverName}: $_" -ForegroundColor Red

    }

    finally {

        # Cerrar sesión remota

        if ($session) {

            Remove-PSSession $session

        }

    }

}

 

Write-Host "Despliegue finalizado en todos los servidores." -ForegroundColor Yellow

 

 

 

Preparativo 3: Prepararemos el listado de host a los que instalaremos el programa.

Es muy importante que los nombres no tengan espacios en blanco

 Antes de la ejecución debemos crear el listado de servidores. Para ello usaremos el fichero servidores.txt, en este ejemplo pondremos dos host a ser receptores de la nueva instalación

 



Paso 1: Ejecutamos el proceso

 Conectarse a un DC y/o abrir una consola de PowerShell como administrador del dominio para que no tenga problemas a la hora de la ejecución local en los hosts de este dominio.


Yo por ejemplo estoy monitorizando con Nagios si se va levantado el servicio en mis servidores

by GoN | Published: Sep 2025 | Last Updated:

viernes, 12 de septiembre de 2025

CISCO. Wifi Security. ISOLATION

Purpose

Isolate the elements of a Wi-Fi network from each other.


In Cisco-managed wireless environments (such as those using Wireless LAN Controllers, or WLCs), client isolation refers to preventing devices connected to the same wireless network from communicating directly with each other. This is typically achieved through features like:

  • P2P Blocking (Peer-to-Peer Blocking): Found in the advanced settings of a WLAN profile. When enabled (e.g., set to Drop), it blocks direct communication between WiFi clients connected to the same access point managed by the same WLC.

  • AP Isolation (common in consumer-grade or SMB routers): Prevents clients connected to the same access point from seeing or interacting with each other. This is useful in public or shared environments like cafés, hotels, or conferences, where you want to prevent attacks like ARP spoofing or traffic sniffing.

Steps

While there isn’t a literal command called ISOLATION, the effect is achieved through configurations such as:

  • P2P Blocking Action in the WLAN settings → can be set to Drop or Forward.

  • On switches, a similar effect is achieved using switchport protected, but in WiFi it’s handled at the SSID and controller level.

recommended for

  • In public or shared networks where clients shouldn’t interact.

  • In enterprise environments with strict security policies.

  • To protect IoT or smart devices that don’t need to communicate with each other.

by GoN | Published: Oct 2025 | Last Updated:

TOOLS. EXELS joins columns

 Excel Spanish version.


Purpose

Os pongo algunos ejemplo útiles para unificar información siguiendo diferentes criterios.


Exemples


Para unir los valores de la columna B cuando en la columna A aparece el texto "Submitted Data",:

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B1:B100 ; ESNUMERO(HALLAR("Submitted Data" ; A1:A100))))

 

Para unir los valores de la columna B cuando en la columna A aparece el texto "Submitted Data" y en la columna D aparece "1-ESP",

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B1:B100 ;(A1:A100="Submitted Data")*(D1:D100="1-ESP")))

 

Para unir los valores de la columna B cuando en la columna A NO aparezca el texto "Submitted Data"

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B1:B100 ; A1:A100<>"Submitted Data"))

  

Para unir los valores de la columna B cuando en la columna A NO aparezca el texto "Submitted Data" y en la columna D aparezca "1-ESP"

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B2:B1500 ;(A2:A1500<>"Submitted Data")*(D2:D1500="1-ESP")))


by GoN | Published: Oct 2025 | Last Updated:

Mobile Security. Business manager. Justify changing your phone.

Recommendation for replacing the cell phone of a senior official in the company.


In companies, especially large ones, very few people have access to privileged information. Occasionally, security breaches or important data leaks occur, the source of which is impossible to trace.


Many of our executives not only manage business issues through their phones, but sometimes also participate in other forums as consultants, managers, politicians, etc.


In these cases, the cell phones they use are not just personal tools, but strategic resources for operational continuity and ensuring functional availability in crisis scenarios.


The mobile devices of senior executives are prime targets for malicious actors. Regularly updating them allows us to eliminate potential malware persistence that goes undetected with conventional antivirus, prevent hardware vulnerabilities (such as compromised chips or outdated firmware) from remaining in use, and ensure that devices are free of physical or logical backdoors that could have been introduced during international travel, Wi-Fi access (especially uncontrolled ones), or in uncontrolled environments. In short, it's about eliminating accumulated attack vectors.


Newer mobile models incorporate more secure processors, with dedicated security enclaves, and better support for encryption, advanced biometrics, and multi-factor authentication. In regulated environments (ISO 27001, ENS, GDPR, etc.), this practice can be considered a proactive measure for protecting personal and corporate data.


The cost of a security incident on an executive mobile phone can be exponentially higher (data breach, blackmail, loss of reputation) than replacing the device.


In some companies, whether to use the latest model or as a precaution, this practice is done sporadically.

 

by GoN | Published: Oct 2025 | Last Updated: