Archive for March, 2014

Self-Signed Certificate for LDAPs

March 19, 2014 2 comments

I recently ran into an instance where one of my customers needed to get LDAPs up and functioning quickly. We had a pending engagement to help them implement some Certification Authorities but needed something to hold them ever temporarily until the completion of the project. The following is a way to setup LDAPs using self-signed certificates.

Create the following certificate request making the subject the FQDN of the domain controller, save as .inf file.

Open the Command Prompt as Administrator. Run the following certreq command and call the .inf file

Click Cancel on the Save Request screen after.

Open up the Certificates console using the MMC. Look in Computer Personal Store and export the certificate.

Since there is only one option to not export the private key, click

 Select the Base-64 encoded button to export the file as the Base-64 format, click Next.

Save the file in an easy location for import into the Trusted Root Certification Store, click Save.

 Go to the Trusted Root Certification Authority, right click on Certificates, click Import.


Click Browse to select the file that was just exported.


 Highlight the Base-64 certificate file and click Open.

Place the certificate into the Trusted Root Certification Authorities Store, click Next.


Click Finish to end


Categories: Active Directory

Using PowerShell to display wireless SSID and password

Being in the Information Technology field, I often turn into everyone’s “computer guy”. If you work in IT, you know exactly what I am talking about. I recently have been asked a few times about what password was configured on someone’s personal wireless connection. Sometimes people bring in their other “computer guys” or companies that may get the laptop connected to WiFi and not share the password with them but write it down and put it somewhere. Often the average user is not savvy enough to just hop on their web browser, go to the router URL (remembering that username and password as well), and dig around there to find it. Since PowerShell can do pretty much anything and everything in the Windows world, I have been using this to help assist those in need.

Open a PowerShell window by clicking Start or pressing the Start key on the keyboard and typing PowerShell.

Once the PowerShell windows is open, run this command:

[string](netsh wlan show profiles name=([string](netsh wlan show interface | sls “\sSSID”) | sls “\:.+”| %{$_.Matches} | %{$ssid = $_.Value -replace “\:\s+”; $ssid}) key=clear | sls “Key Content”) | sls “\:.+”| %{$_.Matches} | %{$pass= $_.Value -replace “\:\s”}; Write-Host “SSID:`t”$ssid”`nPass:`t”$pass;

This will display the current SSID and password that is used on the Wireless connection.


Categories: PowerShell