top of page

Welcome. This site is dedicated to strengthening Windows systems against security threats, streamlining complex deployment processes, and leveraging the full potential of PowerShell. 

​

We'll explore common hacking techniques and analyze how they interact with Windows security mechanisms. By understanding how attackers exploit misconfigurations and weaknesses, we can better anticipate and defend against real-world threats. The goal is to enhance your defensive strategies through informed, ethical practice.

​​

My work with Windows security began in 2000 on an NT4 Server, where securing a system often meant manually managing file permissions with little centralized control. Since then, I’ve focused on hardening a wide range of Microsoft environments. In situations without Group Policy or domain infrastructure, effective security becomes less about following a guide and more about applying practical expertise, automating protections without compromising usability. That balance is what continues to drive my work.

​​

For those focused on automation, this site offers tips and tricks covering ConfigMgr, MDT, and PowerShell. Rather than relying on repetitive manual tasks, the emphasis is on scripting and automation to create efficient, scalable solutions. And while the focus is technical, a bit of humor is always welcome, just like a reliable backup strategy.

​

​Links to Content

Scripts can be found on Github @ https://github.com/Tenaka.​

Pentesting stuff can be found @ https://tenaka.gitbook.io/pentesting (this is under development).

​

Attacker vs Defender Results

Reference and results table for the tests carried out so far, click on the links for details.

​

Contact me by submitting a message

Thanks for submitting!

Feel free to use the scripts and techniques but only after thoroughly testing and not for anything malicious. All the content on this site has been tested and should work as-is, the steps are I hope clear and concise, however, if there are any problems please email me using the form.
​
The material and information contained on this website are for general information purposes only. You should not rely upon the information on this website as a basis for making any changes to your Enterprise IT systems.

bottom of page