cool tricks to securing and some how a little forensics.keep in mind that win+x in windows os opens a menu bar that you can control so many other options too.
- Wevtutil
- Event Viewer
- Bypass windows Login
- Calculate hash of a File
- Check if you are local Administrator
- netplwiz
- Powershell DFIR commands
Enables you to retrieve information about event logs and publishers in powershell,cmd, and also git bash.
- To see last 50 login in our device:
wevtutil qe Security /c:50 /rd:true /f:text
you should be administrator to run this command
- Find the last 20 startup events in the System log:
wevtutil query-events System /count:20 /rd:true /format:text /q:"Event[System[(EventID=12)]]"
- Display the status of the Application log:
wevtutil gli Application
- Clear all the events from the Application log:
wevtutil clear-log Application
Event Viewer is a component of Microsoft's Windows operating system that lets administrators and users view the event logs on a local or remote machine.just type:
eventvwr
as you may know you can open accounts on any windows machine without any passwords by just a windwos bootable usb .this is why you should be aware of physical security.when installation go repair this pc and open command prompt and type this command.
move c:\windows\system32\utilman.exe c:\
c is directory that windows is installed,and maybe it is different in your pc.and then this command:
copy c:\windows\system32\cmd.exe c:\windows\system32\utilman.exe
after all:
wpeutil reboot
after the reboot click on ease of use,CMD will opens then type:
net user
after you saw users then the user you want to login with:
net user <desired user> <your password>
you are in windows now!
to calculate hash (sha1.sha256,md5) of a given File just enter the path to that file and you have the hash.
.\hash(md5).ps1
or
.\hash(sha1).ps1
or
.\hash(sha256).ps1
to check if you are local Administrator just run this script
check_admin.bat
To grant access to your computer to users.if any users is present here without permissio then you should be serious ... .type this command in run:
netplwiz
to check windows defender status by powershell:
Get-MpComputerStatus
to stop windows defender in powershell :
Stop-Service -Name “WinDefend”
Type the following command to temporarily disable Microsoft Defender Antivirus and press Enter(To disable Real-time Protection):
Set-MpPreference -DisableRealtimeMonitoring $true
To turn on again, the real time protection give the following command in Windows PowerShell (Admin) and then restart the server:
Set-MpPreference -DisableRealtimeMonitoring $false
Disable Automatic Sample Submission:
Set-MpPreference -SubmitSamplesConsent NeverSend
Disable Cloud-Based Protection:
Set-MpPreference -MAPSReporting Disable
to uninstall:
Uninstall-WindowsFeature -Name Windows-Defender
then reboot and you have it uninstalled
to install it just:
Install-WindowsFeature -Name Windows-Defender
Open a command prompt in "Run as administrator" mode (or PowerShell) and enter:
netsh advfirewall set allprofiles state off.
To verify that Windows Firewall for all networks is off:
netsh advfirewall show all.
To get the current status of Windows Firewall using PowerShell:
Get-NetFirewallProfile
To see if weather Audit is enabled
Get-SmbServerConfiguration | Select AuditSmb1Access
To see if weather smb v1 is enabled
Get-SmbServerConfiguration | Select EnableSMB1Protocol
To enable smb v1 in our server
Set-SmbServerConfiguration -EnableSMB1Protocol $true
to enable signing in smb v1 just go to group policy and security options and enable Microsoft network server Digitally signed
this is usefull for prevention of man in the middle attacks.
to enable encryption in smb v1 just execute this powershell command:
Set-SmbServerConfiguration -RejectUnencryptedAccess $true
if you had to refrence a server y ip instead of DNS kerberos fails and NTLM V2 will work
i have collected usefull scripts for DFIR with powershell tools.for more take a look at Here
for more information you can see this links. Incident Response Powershell