This site contains links to tools / techniques which can run in the background during an engagement.
Linux
- Pspy — Shows the activity on a system.
Windows
- Responder — Waits for other Windows systems to connect to third-party systems and says “YES, I am this system!”. Windows systems then reveal credentials of the user who started the query. Supports SMB, HTTP, DNS, LLMNR, FTP, IMAP, POP3, SMTP, LDAP, RDP, WPAD, Kerberos, …
- When a user is available and a RDP connection, sysmontools can be used to analyse the behaviour of the system.
- Download Sysmon from microsoft
- Download Sysmon config
- Adapt the config evtl. (e.g. for DomainControllers, there are some comments that things could be activated)
- Upload both files to the victim
- On the victim in a termina, start sysmon with
- Sysmon64.exe ‑i
- Apply the config with
- Sysmon64.exe ‑c sysmonconfig-export.xml
- The logs can be seen in the LogViewer in Conesole Root > Event Viewer > Applications and Services Logs > Microsoft > Windows > Sysmon > Operational
Leave a Reply
You must be logged in to post a comment.