You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 21, 2021. It is now read-only.
Retrieve the unique 4648 logon events. This will often find cases where a user is using remote desktop to connect to another computer. It will give the
95
+
Retrieve the unique 4648 logon events. This will often find cases where a user is using remote desktop to connect to another computer. It will give the
97
96
the account that RDP was launched with and the account name of the account being used to connect to the remote computer. This is useful
98
97
for identifying normal authenticaiton patterns. Other actions that will trigger this include any runas action.
99
98
100
-
Function: Find-4648Logons
101
-
Author: Joe Bialek, Twitter: @JosephBialek
102
-
Required Dependencies: None
103
-
Optional Dependencies: None
99
+
Function: Find-4648Logon
100
+
Author: Joe Bialek, Twitter: @JosephBialek
101
+
Required Dependencies: None
102
+
Optional Dependencies: None
104
103
105
104
.DESCRIPTION
106
105
107
-
Retrieve the unique 4648 logon events. This will often find cases where a user is using remote desktop to connect to another computer. It will give the
106
+
Retrieve the unique 4648 logon events. This will often find cases where a user is using remote desktop to connect to another computer. It will give the
108
107
the account that RDP was launched with and the account name of the account being used to connect to the remote computer. This is useful
109
108
for identifying normal authenticaiton patterns. Other actions that will trigger this include any runas action.
110
109
111
110
.EXAMPLE
112
111
113
-
Find-4648Logons
112
+
Find-4648Logon
114
113
Gets the unique 4648 logon events.
115
114
116
115
.NOTES
@@ -120,11 +119,12 @@ Gets the unique 4648 logon events.
Look through the AppLocker logs to find processes that get run on the server. You can then backdoor these exe's (or figure out what they normally run).
371
371
372
-
Function: Find-AppLockerLogs
373
-
Author: Joe Bialek, Twitter: @JosephBialek
374
-
Required Dependencies: None
375
-
Optional Dependencies: None
372
+
Function: Find-AppLockerLog
373
+
Author: Joe Bialek, Twitter: @JosephBialek
374
+
Required Dependencies: None
375
+
Optional Dependencies: None
376
376
377
377
.DESCRIPTION
378
378
379
379
Look through the AppLocker logs to find processes that get run on the server. You can then backdoor these exe's (or figure out what they normally run).
380
380
381
381
.EXAMPLE
382
382
383
-
Find-AppLockerLogs
383
+
Find-AppLockerLog
384
384
Find process creations from AppLocker logs.
385
385
386
386
.NOTES
@@ -390,9 +390,10 @@ Find process creations from AppLocker logs.
Search the registry to find saved RDP client connections. This shows you what connections an RDP client has remembered, indicating what servers the user
515
+
Search the registry to find saved RDP client connections. This shows you what connections an RDP client has remembered, indicating what servers the user
515
516
usually RDP's to.
516
517
517
-
Function: Find-RDPClientConnections
518
-
Author: Joe Bialek, Twitter: @JosephBialek
519
-
Required Dependencies: None
520
-
Optional Dependencies: None
518
+
Function: Find-RDPClientConnection
519
+
Author: Joe Bialek, Twitter: @JosephBialek
520
+
Required Dependencies: None
521
+
Optional Dependencies: None
521
522
522
523
.DESCRIPTION
523
524
524
-
Search the registry to find saved RDP client connections. This shows you what connections an RDP client has remembered, indicating what servers the user
525
-
usually RDP's to.
525
+
Search the registry to find saved RDP client connections. This shows you what connections an RDP client has remembered, indicating what servers the user usually RDP's to.
0 commit comments