Autopsy: find the remote computer name----write up for cyber start L4 C1
problem:
tool: evtx_view , Autopsy
Step 1: export the security event from the image:
Because login log stores in 'security.evtx'.
Step 2: use evtx_view to dump the content of the event as a file 'result':
We can also import it in windows VM to check the result, but transfer to a file is much easier to filter the result.
from the https://eventlogxp.com/blog/logon-type-what-does-it-mean/ ,
we found related windows logon type that for remote login:
tool: evtx_view , Autopsy
Step 1: export the security event from the image:
Because login log stores in 'security.evtx'.
Step 2: use evtx_view to dump the content of the event as a file 'result':
We can also import it in windows VM to check the result, but transfer to a file is much easier to filter the result.
python evtx_dump.py ~/Desktop/evtx_view.v.1.06.osx/111.evtx > result
from the https://eventlogxp.com/blog/logon-type-what-does-it-mean/ ,
we found related windows logon type that for remote login:
- Logon type 3: A user or computer logged on to this computer from the network.
- Logon type 8: NetworkCleartext. A user logged on to this computer from the network. The user’s password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext).
- Logon type 10: RemoteInteractive. A user logged on to this computer remotely using Terminal Services or Remote Desktop.
Step 3: Find the logon type as 3, 8 or 10 in 'result'
The host name is : DESKTOP-KHVIA69