Day 6⃣2⃣
Road to SOC Analyst - How the Windows Event Log System works:
Road to SOC Analyst - How the Windows Event Log System works:
In the last thread we installed a local SIEM solution (ELK Stack) for our HomeLab
🧵
Why did we do that?
Because you wanted to progress in your career by focussing on two things:
1. Setup Logging and Monitoring in a small and clearly defined environment
🧵
Why did we do that?
Because you wanted to progress in your career by focussing on two things:
1. Setup Logging and Monitoring in a small and clearly defined environment
2. Understand the different components & technologies involved:
docker
docker compose
elastic search
logstash
kibana
winlogbeat/logbeat
virtualbox/vmware
WOW!
That is a lot of technologies that you touched recently.
Do you feel comfortable using them now?
a strong... MAYBE
docker
docker compose
elastic search
logstash
kibana
winlogbeat/logbeat
virtualbox/vmware
WOW!
That is a lot of technologies that you touched recently.
Do you feel comfortable using them now?
a strong... MAYBE
How do you get better at using them?
Use them.
as often as possible - ideally, every day (with breaks, e.g. Weekend)
Use them.
as often as possible - ideally, every day (with breaks, e.g. Weekend)
NICE - Today, we will look into Windows Event Logs - an exciting and scary topic.
But fear not!
We will do it together and AS USUAL - step by step!
But fear not!
We will do it together and AS USUAL - step by step!
The Windows Events have IDs - they are numerical & between 1 and 5 digits
Security relevant are mostly: 4608 - 6424
Interesting... can I find what they mean somewhere?
Glad you asked - two options:
microsoft.com
or
ultimatewindowssecurity.com
Security relevant are mostly: 4608 - 6424
Interesting... can I find what they mean somewhere?
Glad you asked - two options:
microsoft.com
or
ultimatewindowssecurity.com
Lets go through them 1 by 1
Application Logs 🎁
These consist of Interactions with Applications e.g. the Windows Software Protection Service (C:\Windows\system32\sppsvc.exe)
As the name suggests, this one protects software - e.g. checks if your Windows was activated ;)
Application Logs 🎁
These consist of Interactions with Applications e.g. the Windows Software Protection Service (C:\Windows\system32\sppsvc.exe)
As the name suggests, this one protects software - e.g. checks if your Windows was activated ;)
2. perform "malicious" powershell / cmd line actions
2.1 e.g. you can add a new user and make this user part of the local admin group
net user <username> <password> /add
net localgroup administrators <username> /add
2.2 or add a new AD service account
2.1 e.g. you can add a new user and make this user part of the local admin group
net user <username> <password> /add
net localgroup administrators <username> /add
2.2 or add a new AD service account
Which Event IDs do you find now?
Pause and check the Security Event Logs - we need 3 Event IDs
reply with the correct Event IDs, you might win something if you have the correct answer 🎁🎁🎁
Pause and check the Security Event Logs - we need 3 Event IDs
reply with the correct Event IDs, you might win something if you have the correct answer 🎁🎁🎁
🛫 Setup Events
The Setup Event Log has Windows Setup events in it,
e.g. when you install the Active Directory Services via Server Manager
or when you add a new Forest
or when you promote a Server to Domain Controller
These information are gathered in the Setup Event Logs
The Setup Event Log has Windows Setup events in it,
e.g. when you install the Active Directory Services via Server Manager
or when you add a new Forest
or when you promote a Server to Domain Controller
These information are gathered in the Setup Event Logs
🧑🏭 System Logs
Your System Logs contain Actions around
⏲️Network Time Server Sync (NTP)
💾Storage
🧑💼Windows Management Instrumentation Service (WMI)
and more.
Two Event IDs are interesting for us:
Service Started (7036) & Service Stopped (7040)
Why?
Your System Logs contain Actions around
⏲️Network Time Server Sync (NTP)
💾Storage
🧑💼Windows Management Instrumentation Service (WMI)
and more.
Two Event IDs are interesting for us:
Service Started (7036) & Service Stopped (7040)
Why?
Attackers might enable uncommon services for persistence (Service-based persistence)
or
restart services after they manipulated/created a local dll - (dll Hijacking)
Watch out for those if you assume you have been breached.
or
restart services after they manipulated/created a local dll - (dll Hijacking)
Watch out for those if you assume you have been breached.
Last but not least
⏩ Forwarded Events
These are typically empty, if you have no idea what they can be used for
Something that might come in handy:
Use a single machine to collect and forward logs from all machines on the subnet/network to the logger
Why would you want this?
⏩ Forwarded Events
These are typically empty, if you have no idea what they can be used for
Something that might come in handy:
Use a single machine to collect and forward logs from all machines on the subnet/network to the logger
Why would you want this?
A Subscription is a Receiver asking to be notified for any update on the Sender Machine Event Logs
This has to be setup for every machine that you want to receive Logs from!
The easiest way is via winrm
run:
winrm quickconfig
from an admin shell on all the machines involved
This has to be setup for every machine that you want to receive Logs from!
The easiest way is via winrm
run:
winrm quickconfig
from an admin shell on all the machines involved
I hope you learned something today. If you liked the thread feel free to:
1. follow me @maikroservice for more content like this - November = 💙-Team, December = Job Hunt + Cyber Career
2. kindly retweet the first tweet in the thread
THX, happy hunting
1. follow me @maikroservice for more content like this - November = 💙-Team, December = Job Hunt + Cyber Career
2. kindly retweet the first tweet in the thread
THX, happy hunting
Loading suggestions...