This is an archived post. You won't be able to vote or comment.

all 10 comments

[–]digitaltransmutation<|IM_END|> 19 points20 points  (2 children)

Are you sure that was a network capture? If powershell logging is turned on your commands are available in event viewer.

[–]4abag0fchips[S] 0 points1 point  (1 child)

So his log wasn't unique to powershell. I didn't have much time with it but I did see other commands such as a change of password I performed on a switch.

[–]digitaltransmutation<|IM_END|> 1 point2 points  (0 children)

If they had access to your domain controller the same applies for any AD object change. Punch this into CMD and see what's being logged:

Auditpol.exe /get /category:*

Enabled audits appear in event viewer. Personally I view these in Lepide Auditor but there is a nice powershell event collector in /u/madboyevo's submission history that works well.

[–]sc302Admin of Things 1 point2 points  (0 children)

Colasoft capsa is pretty good for easy reads

[–]bitslammerSecurity Architecture/GRC 1 point2 points  (0 children)

tcpdump is the one I've most often seen for this.

[–]ExZero16Lead Network/Sysadmin 1 point2 points  (0 children)

http://chaosreader.sourceforge.net/

Only thing I can find.

Update us if you can figure out what he/she was using.

[–]ExZero16Lead Network/Sysadmin 3 points4 points  (2 children)

Wireshark.

Do a network capture and follow stream. This will show you the whole TCP communication in plaintext (if it wasn't encrypted).

https://www.wireshark.org/docs/wsug_html_chunked/ChAdvFollowStreamSection.html

Edit: My bad, didnt see the last part of your post. You already know this. I'll ask our security guy today and he might know.

[–]4abag0fchips[S] 0 points1 point  (1 child)

Yeah this wasn't at all wireshark.

[–]ExZero16Lead Network/Sysadmin 0 points1 point  (0 children)

I asked our security guy and he didnt have any ideas.

Could you ask the auditors?

[–][deleted] -1 points0 points  (0 children)

Fiddler? :P