s/Powershell/PowerShell/g

This commit is contained in:
Eric Conrad
2019-05-01 10:31:09 -03:00
committed by GitHub
parent 82cc713117
commit f453ede47c

View File

@ -44,7 +44,7 @@ Please note that "Set-ExecutionPolicy is not a security control" (quoting @Ben0x
## Examples: ## Examples:
### Process local Windows security event log (Powershell must be run as Administrator): ### Process local Windows security event log (PowerShell must be run as Administrator):
`.\DeepBlue.ps1` `.\DeepBlue.ps1`
@ -73,15 +73,15 @@ or:
- Windows Security - Windows Security
- Windows System - Windows System
- Windows Application - Windows Application
- Windows Powershell - Windows PowerShell
- Sysmon (new) - Sysmon
### Command Lines Logs processed ### Command Lines Logs processed
See 'Logging setup' section below for how to configure these logs See 'Logging setup' section below for how to configure these logs
- Windows Security event ID 4688 - Windows Security event ID 4688
- Windows Powershell event IDs 4103 and 4104 - Windows PowerShell event IDs 4103 and 4104
- Sysmon event ID 1 - Sysmon event ID 1
## Logging setup ## Logging setup
@ -127,10 +127,10 @@ Log SHA256 hashes. Others are fine; DeepBlueCLI will use SHA256.
* Password spraying via failed logon (multiple logon failures, multiple accounts) * Password spraying via failed logon (multiple logon failures, multiple accounts)
* Password spraying via explicit credentials * Password spraying via explicit credentials
* Bloodhound (admin privileges assigned to the same account with multiple Security IDs) * Bloodhound (admin privileges assigned to the same account with multiple Security IDs)
* Command line/Sysmon/Powershell auditing * Command line/Sysmon/PowerShell auditing
* Regex searches * Regex searches
* Obfuscated commands * Obfuscated commands
* Powershell launched via WMIC or PsExec * PowerShell launched via WMIC or PsExec
* Compressed/Base64 encoded commands (with automatic decompression/decoding) * Compressed/Base64 encoded commands (with automatic decompression/decoding)
* Unsigned EXEs or DLLs * Unsigned EXEs or DLLs
* Service auditing * Service auditing