crownjewel-1

Q1: Attackers can abuse the vssadmin utility to create volume shadow snapshots and then extract sensitive files like NTDS.dit to bypass security mechanisms. Identify the time when the Volume Shadow Copy service entered a running state. Open the SYSTEM.evtx log and search for Event ID 7036. Look for events indicating the Volume Shadow Copy service entering a running state: 馃晵 Convert the timestamp to UTC. Q2: When a volume shadow snapshot is created, the Volume shadow copy service validates the privileges using the Machine account and enumerates User groups. Find the User groups it enumerates, the Subject Account name, and also identify the Process ID(in decimal) of the Volume shadow copy service process Search for Event ID 4799 and filter for: ...

September 22, 2024 路 2 min 路 MikeHorn

crownjewel-2

Q1: When utilizing ntdsutil.exe to dump NTDS on disk, it simultaneously employs the Microsoft Shadow Copy Service. What is the most recent timestamp at which this service entered the running state, signifying the possible initiation of the NTDS dumping process? Open the SYSTEM.evtx log and search for Event ID 7036. Use a search (Ctrl+F) for Volume Shadow Copy service events. Identify the most recent entry where the service entered the running state and note the timestamp from the: ...

September 22, 2024 路 2 min 路 MikeHorn