Autopsy: find the remote computer name----write up for cyber start L4 C1

problem:



tool: evtx_view , Autopsy 

Step 1: export the security event from the image:
Because login log stores in 'security.evtx'. 








Step 2: use evtx_view to dump the content of the event as a file 'result':

We can also import it in windows VM to check the result, but transfer to a file is much easier to filter the result.


python evtx_dump.py ~/Desktop/evtx_view.v.1.06.osx/111.evtx > result

from the https://eventlogxp.com/blog/logon-type-what-does-it-mean/ ,
we found related windows logon type that for remote login:


  1. Logon type 3:   A user or computer logged on to this computer from the network.
  2. Logon type 8:  NetworkCleartext. A user logged on to this computer from the network. The user’s password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext).
  3. Logon type 10: RemoteInteractive. A user logged on to this computer remotely using Terminal Services or Remote Desktop.



Step 3: Find the logon type as 3, 8 or 10 in 'result'


The host name is : DESKTOP-KHVIA69

Popular posts from this blog

Phonebook - Hack the box Write up -- Web LDAP injection

wafwaf -- Hack The Box -- Web SQL injection

Cheat sheet for security+