-
Notifications
You must be signed in to change notification settings - Fork 533
eventlog_creds Module #452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
add new module Signed-off-by: Hakan Yavuz <[email protected]>
Signed-off-by: Hakan Yavuz <[email protected]>
fix for lint Signed-off-by: Hakan Yavuz <[email protected]>
Thanks for the PR :) |
Hey dude! Really nice PR! Is there a way you can retrieve the event log files without running additional execute() operation ? |
Hm, maybe we use even/even6, i will look that. |
Signed-off-by: Hakan Yavuz <[email protected]>
add rpc method, Signed-off-by: Hakan Yavuz <[email protected]>
fix for linter, spaces Signed-off-by: Hakan Yavuz <[email protected]>
Amazing!!! To be honest I'd rather have RPC being the default one as it will improve stealthness and allow attacker to dump credentials without rising alerts because of the execute :) |
Signed-off-by: Hakan Yavuz <[email protected]>
@lodos2005 how do you enable the event tracking? Tried enabling "Administrative Templates\System\Audit Process Creation\Include command line in process creation events" (see here), but i don't see any 4688 events in the logs. |
![]() ![]() @NeffIsBack Can you try with template also i found reg key |
Awesome, that worked. So for others reading this, both of the following options must be configured:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome 💙 |
@lodos2005 I want to contribute a PR that connects to the EVEN6 RPC interface over SMB |
Can you post the code? That could probably help identifying the problem |
@NeffIsBack yes, I built a standalone reproducer: https://gist.github.com/dadevel/d4e8906424278f65d0cf8b9bf3aea906 |
Looks indeed like a privilege issue on your side. Your script works flawlessly with the domain admin in my lab: |
Thanks for testing! Can you try with |
Windows is weird. At least I know now that it wasn't me :D |
I have added a new module that extracts user credentials from Windows event logs. The main focus is on monitoring logs, such as Sysmon or Windows Security logs Event ID 4688. If computers are monitored using Windows Event Forwarding (WEF) or SIEM solutions, executed commands and their arguments can be stored in the event log. I designed this module to find credentials in those logs and extract them.