🖥️
Windows DFIR
Ctrlk
  • Introduction
  • Windows Artifacts
    • Windows Quick Tips
    • Account Usage
      • Authentications SAM Artifacts
      • Authentications (Windows Event Log)
      • Group Membership
      • RDP
      • SSH
      • Rouge Local Accounts
      • CrowdStrike Searches
    • Browser Usage
    • Processes
    • Cloud Storage
    • Deleted File or File Knowledge
    • File Download
    • Folder/File Opening/Creation
    • Persistence
    • Physical Location
    • Program Execution
    • Shadow Copies
    • USB Usage
    • Windows Services
    • System Information
    • Event IDs
  • Windows DFIR & MITTR
    • Initial Access
    • Execution
    • Persistence
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
    • Discovery
    • Lateral Movement
    • Collection
    • Command and Control
    • Exfiltration
    • Impact
  • SOC Related
    • Cached Credentials
    • Domain Controller Password Spraying
Powered by GitBook
Page cover
On this page

Was this helpful?

  1. Windows Artifacts

Account Usage

Authentications SAM ArtifactsAuthentications (Windows Event Log)Group MembershipRDPSSHRouge Local AccountsCrowdStrike Searches
PreviousServer File/Folder LocationsNextAuthentications SAM Artifacts

Last updated 1 year ago

Was this helpful?