Skip to content

synacktiv/forensic-msvpn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Microsoft Remote Access VPN Forensic analysis

This repository contains resources related to the forensic analysis made on Microsoft Remote Access VPN and available on this blog post: https://www.synacktiv.com/publications/forensic-aspects-of-microsoft-remote-access-vpn.html.

Velociraptor artifact

Import the Velociraptor Artifact Exchange pack or import Windows.EventLogs.RemoteAccessVPN.yaml from this repository.

  • Summary of the artifact velociraptor summary

  • VPN Client logs velociraptor client

  • VPN Server logs velociraptor vpn server

  • NPS Server logs velociraptor nps server

Chainsaw rules

Specify in your chainsaw cli arguments the microsoft_rasvpn_events directory, or use the rules from chainsaw repository from PR TODO.

chainsaw rules

Python script to export RaAcctDb database

To export the data stored by Remote access reporting feature in the WID RaAcctDb, you must:

  1. Install Python3 in the Remote Access VPN server
  2. Install pyodbc package: pip install pyodbc
  3. Copy csv_export_raacctdb.py in a local directory
  4. Create an output directory
  5. Run the script: python csv_export_raacctdb.py <out_dir> (relative or absolute path are accepted)
  6. A CSV file is created for each table

script results

Copyright

2023 - Théo Letailleur, Synacktiv

License

The contents of this repository is available under AGPL License

Contact

About

This repository contains Velociraptor artifact and Chainsaw rules to help detect Microsoft Remote Access VPN activity

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages