Windows Host Forensics
Windows CLI Basics
Command
Action
Powershell common cmdlets
Command
Alias
Action
Windows Directories to examine
Windows Process with wmic
Network Connections
Windows Services
Registry ASEPs/Registry Persistance
Disable RunOnce
Common Windows Registry Locations to Check
Checking for Malicious Accounts
Scheduled Tasks
Unusual Log Entries
Key Sysinternals tools
Dump Windows Memory
Volatility
General Usage
Vol Plugins
Basic Image Information (Start Here)
Listing Processes
Parent and Child Processes
Network Connections
UserAssist
Processs Command Line
Guidelines
Detecting PSEXEC in logs
Enable Script Block Logging
DLL Search Order Hijacking
Last updated