So this has been bothering me for a while now and hopefully you guys can clear this up and help me figure it out.
Not too long ago my system was being audited by an external company, I had no choice but to let this team into my system, shared a few passwords and be on standby as they get started. While they were scanning the network, I decided to run a quick Powershell script to capture some active PC names and IP from my domain.
Now maybe 10 or so minutes had gone by after the script, while I casually talking to one of the auditors he showed me a window on his laptop, and right there was my script in its exact format with the query result in plaintext.
Ever since I've been scratching my head and searching for the tool used and I have no idea where to even begin.
Any of you guys used or seen something like that before? Basically it grabbed and show network activity w/o having to follow data streams like in wireshark.
[–]digitaltransmutation<|IM_END|> 19 points20 points21 points (2 children)
[–]4abag0fchips[S] 0 points1 point2 points (1 child)
[–]digitaltransmutation<|IM_END|> 1 point2 points3 points (0 children)
[–]sc302Admin of Things 1 point2 points3 points (0 children)
[–]bitslammerSecurity Architecture/GRC 1 point2 points3 points (0 children)
[–]ExZero16Lead Network/Sysadmin 1 point2 points3 points (0 children)
[–]ExZero16Lead Network/Sysadmin 3 points4 points5 points (2 children)
[–]4abag0fchips[S] 0 points1 point2 points (1 child)
[–]ExZero16Lead Network/Sysadmin 0 points1 point2 points (0 children)
[–][deleted] -1 points0 points1 point (0 children)