Detecting Sysmon on the Victim Host
Exploring ways to detect Sysmon presence on the victim system
Last updated
Exploring ways to detect Sysmon presence on the victim system
Last updated
Note: process name can be changed during installation
Note: display names and descriptions can be changed
Note how even though you can change the sysmon service and driver names, the sysmon altitude is always the same - 385201
Once symon executable is found, the config file can be checked like so:
If you are lucky enough, you may be able to find the config file itself on the disk by using native windows utility findstr:
A powershell tool by @mattifestation that extracts sysmon rules from the registry:
As an example, looking a bit deeper into the ProcessCreate
rules:
We can see the rules almost as they were presented in the sysmon configuration XML file:
A snippet from the actual sysmonconfig-export.xml file:
Since Get-SysmonConfiguration gives you the ability to see the rules sysmon is monitoring on, you can play around those.
Another way to bypass the sysmon altogether is explored here:
Unloading Sysmon Driver