Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password.Ĭontains ability to query the value of any user atomĪdversaries may collect data stored in the Windows clipboard from users copying information within or between applications.Īdversaries may target user email to collect sensitive information from a target.įound API call directly followed by "cmp dl, 19h" and "ja 0000000140015066h" ( Show Stream)įound API call directly followed by "cmp dword ptr, esp" and "xor edx, edx" ( Show Stream)įound API call directly followed by "cmp dword ptr, edi" and "je 0000000140007F58h" ( Show Stream)įound API call directly followed by "cmp dl, 19h" and "ja 40015066h" from LiveEnhancementSuite1.2.exe (PID: 3648) ( Show Stream)įound API call directly followed by "cmp dword ptr, esp" and "xor edx, edx" from LiveEnhancementSuite1.2.exe (PID: 3648) ( Show Stream)įound API call directly followed by "cmp dword ptr, edi" and "je 40007F58h" from LiveEnhancementSuite1.2.exe (PID: 3648) ( Show Stream) Reads terminal service related keys (often RDP related) Remote desktop is a common feature in operating systems. Reads information about supported languagesĪn adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.Ĭontains ability to query CPU information The system time is set and stored by the Windows Time Service within a domain to maintain time synchronization between systems and services in an enterprise network.Īdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. Scans for the windows taskbar (may be used for explorer injection)Ĭontains ability to write to a remote processĪdversaries can use methods of capturing user input for obtaining credentials for ] and information ] that include keylogging and user input field interception.Ĭontains ability to retrieve keyboard strokesĪdversaries may attempt to get a listing of open application windows. Process injection is a method of executing arbitrary code in the address space of a separate live process.įound a string that may be used as part of an injection method Opens the Kernel Security Device Driver (KsecDD) of Windows Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |