Added initial examples menu
This commit is contained in:
71
README.md
71
README.md
@ -14,9 +14,10 @@ Sample evtx files are in the .\evtx directory
|
|||||||
|
|
||||||
## Table of Contents
|
## Table of Contents
|
||||||
- [Usage](#usage)
|
- [Usage](#usage)
|
||||||
- [Examples](#examples)
|
- [Syntax](#syntax)
|
||||||
- [Logging setup](#logging-setup)
|
|
||||||
- [Detected events](#detected-events)
|
- [Detected events](#detected-events)
|
||||||
|
- [Examples](#examples)
|
||||||
|
- [Logging setup](#logging-setup)
|
||||||
- See the [DeepBlue.py Readme](README-DeepBlue.py.md) for information on DeepBlue.py
|
- See the [DeepBlue.py Readme](README-DeepBlue.py.md) for information on DeepBlue.py
|
||||||
- See the [DeepWhite Readme](README-DeepWhite.md) for information on DeepWhite (detective whitelisting using Sysmon event logs)
|
- See the [DeepWhite Readme](README-DeepWhite.md) for information on DeepWhite (detective whitelisting using Sysmon event logs)
|
||||||
|
|
||||||
@ -42,7 +43,7 @@ See `get-help Set-ExecutionPolicy` for more options.
|
|||||||
|
|
||||||
Please note that "Set-ExecutionPolicy is not a security control" (quoting @Ben0xA)
|
Please note that "Set-ExecutionPolicy is not a security control" (quoting @Ben0xA)
|
||||||
|
|
||||||
## Examples:
|
## Syntax:
|
||||||
|
|
||||||
### Process local Windows security event log (PowerShell must be run as Administrator):
|
### Process local Windows security event log (PowerShell must be run as Administrator):
|
||||||
|
|
||||||
@ -84,6 +85,44 @@ See 'Logging setup' section below for how to configure these logs
|
|||||||
- Windows PowerShell event IDs 4103 and 4104
|
- Windows PowerShell event IDs 4103 and 4104
|
||||||
- Sysmon event ID 1
|
- Sysmon event ID 1
|
||||||
|
|
||||||
|
## Detected events
|
||||||
|
|
||||||
|
* Suspicious account behavior
|
||||||
|
* User creation
|
||||||
|
* User added to local/global/universal groups
|
||||||
|
* Password guessing (multiple logon failures, one account)
|
||||||
|
* Password spraying via failed logon (multiple logon failures, multiple accounts)
|
||||||
|
* Password spraying via explicit credentials
|
||||||
|
* Bloodhound (admin privileges assigned to the same account with multiple Security IDs)
|
||||||
|
* Command line/Sysmon/PowerShell auditing
|
||||||
|
* Regex searches
|
||||||
|
* Obfuscated commands
|
||||||
|
* PowerShell launched via WMIC or PsExec
|
||||||
|
* Compressed/Base64 encoded commands (with automatic decompression/decoding)
|
||||||
|
* Unsigned EXEs or DLLs
|
||||||
|
* Service auditing
|
||||||
|
* Suspicious service creation
|
||||||
|
* Service creation errors
|
||||||
|
* Stopping/starting the Windows Event Log service (potential event log manipulation)
|
||||||
|
* EMET & Applocker Blocks
|
||||||
|
* Sensitive Privilege Use (Mimikatz)
|
||||||
|
|
||||||
|
...and more
|
||||||
|
|
||||||
|
## Examples
|
||||||
|
|
||||||
|
|Event|Command|
|
||||||
|
|-----|-------|
|
||||||
|
|Obfuscation (encoding)|`.\DeepBlue.ps1 .\evtx\Powershell-Invoke-Obfuscation-string-menu.evtx\`|
|
||||||
|
|Obfuscation (string)|`.\DeepBlue.ps1 .\evtx\Powershell-Invoke-Obfuscation-string-menu.evtx`|
|
||||||
|
|Password guessing|`.\DeepBlue.ps1 .\evtx\smb-password-guessing-security.evtx`|
|
||||||
|
|Password spraying|`.\DeepBlue.ps1 .\evtx\password-spray.evtx`|
|
||||||
|
|Mimikatz hashdump|`.\DeepBlue.ps1 .\evtx\mimikatz-privesc-hashdump.evtx`|
|
||||||
|
|New user creation|`.\DeepBlue.ps1 .\evtx\new-user-security.evtx`|
|
||||||
|
|User added to administrator group|`.\DeepBlue.ps1 .\evtx\new-user-security.evtx`|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Logging setup
|
## Logging setup
|
||||||
|
|
||||||
### Security event 4688 (Command line auditing):
|
### Security event 4688 (Command line auditing):
|
||||||
@ -118,29 +157,3 @@ DeepBlue and DeepWhite currently use Sysmon events, 1, 6 and 7.
|
|||||||
|
|
||||||
Log SHA256 hashes. Others are fine; DeepBlueCLI will use SHA256.
|
Log SHA256 hashes. Others are fine; DeepBlueCLI will use SHA256.
|
||||||
|
|
||||||
## Detected events
|
|
||||||
|
|
||||||
* Suspicious account behavior
|
|
||||||
* User creation
|
|
||||||
* User added to local/global/universal groups
|
|
||||||
* Password guessing (multiple logon failures, one account)
|
|
||||||
* Password spraying via failed logon (multiple logon failures, multiple accounts)
|
|
||||||
* Password spraying via explicit credentials
|
|
||||||
* Bloodhound (admin privileges assigned to the same account with multiple Security IDs)
|
|
||||||
* Command line/Sysmon/PowerShell auditing
|
|
||||||
* Regex searches
|
|
||||||
* Obfuscated commands
|
|
||||||
* PowerShell launched via WMIC or PsExec
|
|
||||||
* Compressed/Base64 encoded commands (with automatic decompression/decoding)
|
|
||||||
* Unsigned EXEs or DLLs
|
|
||||||
* Service auditing
|
|
||||||
* Suspicious service creation
|
|
||||||
* Service creation errors
|
|
||||||
* Stopping/starting the Windows Event Log service (potential event log manipulation)
|
|
||||||
* EMET & Applocker Blocks
|
|
||||||
* Sensitive Privilege Use (Mimikatz)
|
|
||||||
|
|
||||||
...and more
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user