added network forensics
This commit is contained in:
parent
6734e25c2d
commit
d54dc0daf9
|
@ -0,0 +1,99 @@
|
|||
# Windows Network
|
||||
|
||||
## Windows Firewall
|
||||
|
||||
Logfiles of the Windows Firewall can be found under `C:\Windows\System32\LogFiles\firewall`.
|
||||
|
||||
```sh
|
||||
Get-Content C:\Windows\System32\LogFiles\Firewall\pfirewall.log
|
||||
```
|
||||
|
||||
## SRUB.dat
|
||||
|
||||
Use kape.exe to extract a dump of used system resources from `C:\Windows\System32\sru`
|
||||
|
||||
```sh
|
||||
./kape.exe --tsource C:\Windows\System32\sru --tdest C:\Windows\Temp\sru --tflush --mdest C:\Windows\Temp\module --mflush --moduel SRUMDmp --target SRUM
|
||||
```
|
||||
|
||||
Use [MarkBaggett's srum-dump](https://github.com/MarkBaggett/scrum-dump) to
|
||||
take a look at the extracted files.
|
||||
|
||||
## Network Connections
|
||||
|
||||
Take a look at current connections through the following line.
|
||||
|
||||
```sh
|
||||
netstat -a -o
|
||||
```
|
||||
|
||||
See the name of the portable executable that initiated the connection via the
|
||||
following command.
|
||||
|
||||
```sh
|
||||
netstat -b
|
||||
```
|
||||
|
||||
Take a look at the current TCP connections via the following powershell one-liner.
|
||||
|
||||
```sh
|
||||
Get-NetTCPConnection | select localAddress,localPort,remoteAddress,remotePort,state,@{name="process";Expression={(get-process -id $_.owningProcess).ProcessName}}, @{Name="cmdLine";Expression={(Get-WmiObject win32_Process -filter "ProcessID = $($_.owningProcess)").commandline}} | sort remoteAddress
|
||||
-Descending | ft -wrap -autosize
|
||||
```
|
||||
|
||||
Take a look at the current UDP connections via the following powershell one-liner.
|
||||
|
||||
```sh
|
||||
Get-NetUDPEndpoint | select local*,creationTime,remote* | ft -autosize
|
||||
```
|
||||
|
||||
There is something similar to TCPDump for catching network packets on windows.
|
||||
Start the packet gathering via `pktmon start -c`. Convert the stored file, so
|
||||
Wireshark is able to read it via `pktmon etl2pcap`.
|
||||
|
||||
### IP Addresses
|
||||
|
||||
List unqiue IP addresses through the following one-liner.
|
||||
|
||||
```sh
|
||||
(Get-NetTCPConnection).remoteAddress | Sort-Object -unique
|
||||
```
|
||||
|
||||
List connections of an IP address through the following one-liner.
|
||||
|
||||
```sh
|
||||
Get-NetTCPConnection -remoteAddress <IP-Address> | select state,creationTime,localPort,remotePort | ft -autosize
|
||||
```
|
||||
|
||||
### DNS Cache
|
||||
|
||||
Gather information about the DNS cache through the following one-liner.
|
||||
|
||||
```sh
|
||||
Get-DNSClientCache | ? Entry -noMatch "workst|servst|kerb|ws|oscp" | out-string -width 1000
|
||||
```
|
||||
|
||||
### Hostnames
|
||||
|
||||
Take a look at the set hosts inside the hosts file.
|
||||
|
||||
```sh
|
||||
Get-Content C:\Windows\System32\Drivers\etc\hosts
|
||||
```
|
||||
|
||||
### Network Services
|
||||
|
||||
Current RDP connections can be found through the following one-liner.
|
||||
|
||||
```sh
|
||||
qwinsta
|
||||
```
|
||||
|
||||
Current SMB shares and connections can be found through the following lines.
|
||||
|
||||
```sh
|
||||
Get-SmbShare
|
||||
Get-SmbConnection
|
||||
```
|
||||
|
||||
|
Loading…
Reference in New Issue