Here you will find a wide variety of Blue Team focused commands and tutorials from "Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder". BTHb:INRE was first published in 2014, and is getting a major update in 2025, and soon to be on the O'Reilly Books online platform. (All material (c) 2014, 2025 Don Murdoch).
- Essential Pattern Matching Tutorial for Grep ‐ Incident Response
- Windows 10 11 Auto Start Extensibility Points (ASEPs)
- Windows Process Explorer IR Guide (Windows 11)
- tcpdump and tshark for the Incident Responder and wireshark for the Incident Responder
For examining Windows systems there are several scripts.
- get-sysmon-exe-longtail.ps1 collects a long tail analysis view of EXE's frmo Event ID 1 in the sysmon logs. Has an "hours" counter in the script.
- get-process-owner-cmdline.ps1 gets the current list of processes and the owner.
- get-service-summary.ps1 gets a services summary, a little better than the SC command.
- get-wmi-info.ps1 can be used to gather quite a bit of WMI data.
- get-files-by-date.ps1 for locating files by create/modification time in a particular drive letter and path (make sure to update the variables at the top).
Windows System State
- get-installed-apps-registry.ps1 will pull out installed applications based on the system registry using multiple keys.
- get-installed-apps-brief.ps1 will list installed apps in a brief format, similar to Control Panels list, and provides names, version, and size.
- get-disk-info.ps1 to pull out details and summary about physical and logical volumes.
- get-last-24-with-detail.ps1 can be used to find what has changed in the last 24 hours.
Thhere are a wide variety of utility oriented scripts.
- set-win-ad-audit-cis.ps1 can be used to configure Windows auditing in accordance with the CIS 2019 bench mark (plus, added detailed tracking for the 4688 event!)
- posh_clock.ps1 creates a very large clock in a PowerShell prompt. Has some code to change the digits colors on the hour and the last five minutes in the hour.
- get-sysinternals.ps1 downloads Microsofts Sysinternals tools into C:\Sysinternals from the stable URL and cleans up after itself.
- install_nsm_tools.sh
Scripts for Active Directory.
- check-ads-for-compromise.ps1 can be used to searched for a variety of indicators on an AD DC. Note - this cript produces numerous output files in C:\IR\HOST-NAME using the date stamp format advised by BTHb. Many of the event log checks stop at 15 or 20 events. Best bet - spend some time w/ the code, pull out parts to do some more in depht collection.
- red-team-simulator.ps1 is something to perform causal activity and indicators that the AD DC detection script can find.
- There will be a set of "default system state" output files as the BTHb repository matures.
For Linux containment, there are two exmaple scripts.
- [[Linux Containment firewall script using nft]]
- [[Linux Containment firewall script using iptables]]
- [[Docker Investigation]]
For Router, Switch, and Firewall, here are some useful commands.
- [[Cisco IOS 15.X IR Commands]]
- [[PanOS 11.X IR Commands]]
For memory analysis with Volatility 3, there are two utility scripts
- The first script is an installer, which assumes a freshly installed Ubuntu.
- There is also a more complete symbol install script to ensure that Windows 11 memory images can be examined.
For Sysmon, there are several scripts forthcoming.
- There is an XML configuration file which has Event ID 3 (network traffic) events enabled. This is a copy of the Swift on Security XML config, but w/ the extra spice of Event ID 3 enabled.
This code and repository are copyright 2025 by Don Murdoch.