crownjewel-1
Q1: Attackers can abuse the vssadmin utility to create volume shadow snapshots and then extract sensitive files like NTDS.dit to bypass security mechanisms. Identify the time when the Volume Shadow Copy service entered a running state. Open the SYSTEM.evtx log and search for Event ID 7036. Look for events indicating the Volume Shadow Copy service entering a running state: 馃晵 Convert the timestamp to UTC. Q2: When a volume shadow snapshot is created, the Volume shadow copy service validates the privileges using the Machine account and enumerates User groups. Find the User groups it enumerates, the Subject Account name, and also identify the Process ID(in decimal) of the Volume shadow copy service process Search for Event ID 4799 and filter for: ...