πEvent Log Readers
π― Overview
π Process Creation Auditing Background
Event ID 4688 - Process Creation
# When enabled, logs contain:
- Process name and path
- Command line arguments
- User context
- Process ID (PID)
- Parent process informationSecurity Implications
Organizational Detection Use Cases
π Group Membership Detection
Verify Event Log Readers Membership
Alternative Verification Methods
π Event Log Analysis Techniques
Method 1: wevtutil Command Line
Basic Security Log Search
Advanced wevtutil Usage
Common Search Patterns
Method 2: Get-WinEvent PowerShell
Process Creation Event Analysis
Alternative PowerShell Searches
PowerShell Operational Log Analysis
π― HTB Academy Lab Solution
Lab Environment
Detailed Step-by-Step Solution
1. RDP Connection
2. Verify Group Membership
3. Search Security Logs for Credentials
Method A: wevtutil Search
Method B: PowerShell Analysis
Method C: Comprehensive Search
4. Analyze Results
5. Extract Password
Alternative Search Strategies
Registry-Based Credential Search
Application Event Logs
PowerShell History Analysis
π Common Credential Exposure Scenarios
Network Authentication
Service Execution
Database Connections
PowerShell Execution
β οΈ Limitations and Considerations
Registry Permissions
Log Retention
Operational Awareness
π Detection Indicators
Event Log Access
Tool Usage Patterns
π‘οΈ Defense Strategies
Command Line Auditing Best Practices
Event Log Protection
Detection Rules
π Event Log Readers Exploitation Checklist
Prerequisites
Reconnaissance
Credential Search
Analysis and Extraction
π‘ Key Takeaways
Last updated