-
Notifications
You must be signed in to change notification settings - Fork 362
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
eventlog_creds Module #452
base: main
Are you sure you want to change the base?
Conversation
add new module Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
fix for lint Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
Thanks for the PR :) |
Hey dude! Really nice PR! Is there a way you can retrieve the event log files without running additional execute() operation ? |
Hm, maybe we use even/even6, i will look that. |
Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
add rpc method, Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
fix for linter, spaces Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
Amazing!!! To be honest I'd rather have RPC being the default one as it will improve stealthness and allow attacker to dump credentials without rising alerts because of the execute :) |
Signed-off-by: Hakan Yavuz <lodos05@gmail.com>
I have added a new module that extracts user credentials from Windows event logs. The main focus is on monitoring logs, such as Sysmon or Windows Security logs Event ID 4688. If computers are monitored using Windows Event Forwarding (WEF) or SIEM solutions, executed commands and their arguments can be stored in the event log. I designed this module to find credentials in those logs and extract them.