I've been running around between the green lawns of Windows and Linux, building skills on both sides of the fence. If I am working on the Microsoft side, I do everything I can through PowerShell. Regardless of the OS flavor, I script to automate whatever processes I can!
Other than that, and eating several bowls of virtual machine soup, I write incomplete fiction and study a broad array of subjects.
With Jenkins, you can use the PowerShell Plugin to have jobs executing PowerShell scripts. You can also use the Credentials Binding Plugin to pass in usernames/passwords, that are stored on Jenkins in an encrypted credential store, to your scripts!
I wanted to make this short post to show how easy it is to take advantage of credentials that can be used by multiple jobs, and only have to change them in the credential store (as opposed to changing their value in every single job).
When the proper plugins are installed on Jenkins, new jobs should have the ability to pass bound credentials into your scripts (be it PowerShell, bash, etc.) as environmental variables. Your jobs will have a Use secret text(s) or file(s) checkbox that, when checked, provides the ability to select the types of bindings you are using. In my case in the screenshot below, I pass the Username and Password (separated) credential option, as to provide two separate environmental variables into the script:
Now your scripts can have credential objects passed to them, if they have -Credential parameters that can take the appropriate object types. You would create credential objects as so:
Premise: Death and birth certificates can be filed online, with practically no oversight. DefCon Response: Let’s show the world how easy it is to kill anyone, and/or profit from the birthing/killing of virtual…babies?
This is one blog article in a series titled the DefCon 23 Debrief Series. This year was my first year at DefCon in Vegas, and it was awesome. If you ever have the opportunity to get your work to ship you there? Take it. If you ever get the opportunity to ship yourself? Don’t think. Go.
Premise: Let’s place a computer on a gun, and give it WiFi. DefCon Response: Let’s hijack it, and install our own malicious updates.
This is the first article in a series titled the DefCon 23 Debrief Series. I may be doing one or more further articles, given time. This year was my first year at DefCon in Vegas, and it was awesome. If you ever have the opportunity to get your work to ship you there? Take it. If you ever get the opportunity to ship yourself? Don’t think. Go.
This week, Twin Cities PowerShell had Michael Greene and Mark Gray from the Microsoft PowerShell Team speak to the user group! There was quite a bit of content, so I’ve put together a summary of everything we had gone over — with a ridiculous amount of resource linkage:
This is just a quick blurb, but you may have wanted a nice way to query the Unix Attributes tab of AD accounts. Using PowerShell, and the ActiveDirectory Module, you can pull these values quite easily. The AD property names are listed above each box in this example: