s/Powershell/PowerShell/g
This commit is contained in:
12
README.md
12
README.md
@ -44,7 +44,7 @@ Please note that "Set-ExecutionPolicy is not a security control" (quoting @Ben0x
|
|||||||
|
|
||||||
## Examples:
|
## Examples:
|
||||||
|
|
||||||
### Process local Windows security event log (Powershell must be run as Administrator):
|
### Process local Windows security event log (PowerShell must be run as Administrator):
|
||||||
|
|
||||||
`.\DeepBlue.ps1`
|
`.\DeepBlue.ps1`
|
||||||
|
|
||||||
@ -73,15 +73,15 @@ or:
|
|||||||
- Windows Security
|
- Windows Security
|
||||||
- Windows System
|
- Windows System
|
||||||
- Windows Application
|
- Windows Application
|
||||||
- Windows Powershell
|
- Windows PowerShell
|
||||||
- Sysmon (new)
|
- Sysmon
|
||||||
|
|
||||||
### Command Lines Logs processed
|
### Command Lines Logs processed
|
||||||
|
|
||||||
See 'Logging setup' section below for how to configure these logs
|
See 'Logging setup' section below for how to configure these logs
|
||||||
|
|
||||||
- Windows Security event ID 4688
|
- Windows Security event ID 4688
|
||||||
- Windows Powershell event IDs 4103 and 4104
|
- Windows PowerShell event IDs 4103 and 4104
|
||||||
- Sysmon event ID 1
|
- Sysmon event ID 1
|
||||||
|
|
||||||
## Logging setup
|
## Logging setup
|
||||||
@ -127,10 +127,10 @@ Log SHA256 hashes. Others are fine; DeepBlueCLI will use SHA256.
|
|||||||
* Password spraying via failed logon (multiple logon failures, multiple accounts)
|
* Password spraying via failed logon (multiple logon failures, multiple accounts)
|
||||||
* Password spraying via explicit credentials
|
* Password spraying via explicit credentials
|
||||||
* Bloodhound (admin privileges assigned to the same account with multiple Security IDs)
|
* Bloodhound (admin privileges assigned to the same account with multiple Security IDs)
|
||||||
* Command line/Sysmon/Powershell auditing
|
* Command line/Sysmon/PowerShell auditing
|
||||||
* Regex searches
|
* Regex searches
|
||||||
* Obfuscated commands
|
* Obfuscated commands
|
||||||
* Powershell launched via WMIC or PsExec
|
* PowerShell launched via WMIC or PsExec
|
||||||
* Compressed/Base64 encoded commands (with automatic decompression/decoding)
|
* Compressed/Base64 encoded commands (with automatic decompression/decoding)
|
||||||
* Unsigned EXEs or DLLs
|
* Unsigned EXEs or DLLs
|
||||||
* Service auditing
|
* Service auditing
|
||||||
|
Reference in New Issue
Block a user