πŸ“‹Event Log Readers

🎯 Overview

Event Log Readers group members have permission to access Windows event logs, particularly the Security event log. When process creation auditing is enabled, command line arguments are logged as Event ID 4688, potentially exposing sensitive information including passwords, usernames, and authentication credentials passed as command-line parameters.

πŸ“Š Process Creation Auditing Background

Event ID 4688 - Process Creation

# When enabled, logs contain:
- Process name and path
- Command line arguments  
- User context
- Process ID (PID)
- Parent process information

Security Implications

Common exposed data:

  • Network authentication credentials (net use /user:username password)

  • Database connection strings

  • API keys and tokens

  • Service account passwords

  • PowerShell script credentials

Organizational Detection Use Cases

πŸ” Group Membership Detection

Verify Event Log Readers Membership

Alternative Verification Methods

πŸ”Ž Event Log Analysis Techniques

Method 1: wevtutil Command Line

Advanced wevtutil Usage

Common Search Patterns

Method 2: Get-WinEvent PowerShell

Process Creation Event Analysis

Alternative PowerShell Searches

PowerShell Operational Log Analysis

🎯 HTB Academy Lab Solution

Lab Environment

  • Credentials: logger:HTB_@cademy_stdnt!

  • Access Method: RDP

  • Objective: Find password for user mary using Event Log Readers privileges

Detailed Step-by-Step Solution

1. RDP Connection

2. Verify Group Membership

3. Search Security Logs for Credentials

Method B: PowerShell Analysis

4. Analyze Results

5. Extract Password

Alternative Search Strategies

Application Event Logs

PowerShell History Analysis

πŸ”’ Common Credential Exposure Scenarios

Network Authentication

Service Execution

Database Connections

PowerShell Execution

⚠️ Limitations and Considerations

Registry Permissions

Log Retention

Operational Awareness

πŸ” Detection Indicators

Event Log Access

Tool Usage Patterns

πŸ›‘οΈ Defense Strategies

Command Line Auditing Best Practices

Event Log Protection

Detection Rules

πŸ“‹ Event Log Readers Exploitation Checklist

Prerequisites

Reconnaissance

Analysis and Extraction

πŸ’‘ Key Takeaways

  1. Event Log Readers provides access to sensitive command-line history

  2. Process creation auditing often exposes embedded credentials

  3. wevtutil and Get-WinEvent are primary analysis tools

  4. Command-line passwords are common in enterprise environments

  5. PowerShell logs may contain additional sensitive information

  6. Pattern-based searches effectively identify credential exposure

  7. Minimal privileges can yield high-value intelligence


Event Log Readers group membership provides valuable reconnaissance capabilities through analysis of logged command-line executions and process creation events.

Last updated