-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response for Windows
By :

Since network propagation is the connecting element between the hosts involved in an incident, it makes sense to consider the search for traces of their execution from two perspectives – the source position and the destination position. In this case, the main sources of traces of lateral movement that we will consider will be the already-known-to-us event logs, the system files, the registry, and the filesystem. Well, less discussion; let’s start with searching for traces of using remote services.
When using remote services to move around the network, adversaries may use extracted valid accounts to connect to remote hosts via RDP, WinRM, and remote access tools such as PsExec. In this case, both the source and destination hosts will have some traces left behind.
Thus, when connecting via RDP, the source host will log event IDs 1024 and 1102 in the Microsoft-Windows-Terminal Services-RDPClient/Operational
event log located...
Change the font size
Change margin width
Change background colour