Account Discovery & Enumeration
Discovery
Execution
Let's run some of the popular enumeration commands on the victim system:
attacker@victim
Hunting and Observations
Having command line logging can help in identifying a cluster of enumeration commands executed in a relatively short span of time on a compromised host .
For this lab, I exported 8600+ command lines from various processes and wrote a dirty powershell script that ingests those command lines and inspects them for a couple of classic windows enumeration commands that are executed in the span of 2 minutes and spits them out:
hunt.ps1
Invoking the script to start the hunt:
Below are some of the findings which may warrant further investigation of the suspect host:
References
PreviousApplication Window DiscoveryNextUsing COM to Enumerate Hostname, Username, Domain, Network Drives
Last updated